Static task
static1
Behavioral task
behavioral1
Sample
0307e0d15c32d31b515746ba3c65581a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0307e0d15c32d31b515746ba3c65581a.exe
Resource
win10v2004-20231215-en
General
-
Target
0307e0d15c32d31b515746ba3c65581a
-
Size
60KB
-
MD5
0307e0d15c32d31b515746ba3c65581a
-
SHA1
00c279cbbf8606f8a16f8093ccfa556b99cc49f3
-
SHA256
54a2321de9d54f9bfa175ad28e984cee4b82dc2825db3bba43b5a1f483bdfaca
-
SHA512
a370797c0ae0c3104afe9a86670101ad402807b5673c919f8e879a2939f32f9a728116a7ad3da617aa0009fe53cee7b8c09bf5d7627f37d776c5a8382d06911f
-
SSDEEP
1536:kbIQZki9PO98Ybrlp+XFnIpAWrXlhyIQCtGoeCyjCAXeIxXE13Ys0HBlN:kbme2AK82BpAeIXAIr3N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0307e0d15c32d31b515746ba3c65581a
Files
-
0307e0d15c32d31b515746ba3c65581a.exe windows:4 windows x86 arch:x86
26a271b64b542fa693afb5683aaae5d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomW
CreateProcessW
InterlockedIncrement
SetEvent
DeleteFileW
GetCurrentThread
GetModuleHandleW
GlobalAlloc
SetFilePointer
QueryDosDeviceW
LockResource
lstrcpyW
GetTickCount
ResumeThread
WaitForSingleObject
CreateFileW
ReadProcessMemory
SetEndOfFile
GetProcAddress
SetWaitableTimer
ReadFile
SetThreadPriority
FindResourceExW
LoadLibraryA
WaitForMultipleObjects
GetModuleFileNameW
SetCurrentDirectoryW
VirtualFree
GetDriveTypeW
user32
GetWindowThreadProcessId
TranslateMessage
FillRect
VkKeyScanW
LoadImageW
LoadIconW
SetCursor
CreateWindowExW
LoadCursorW
GetWindowDC
RegisterClassExW
RegisterWindowMessageW
SetForegroundWindow
GetWindowRect
gdi32
DeleteDC
StretchBlt
LineTo
SetTextColor
advapi32
SetSecurityDescriptorDacl
StartServiceW
RegOpenKeyExW
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE