Static task
static1
Behavioral task
behavioral1
Sample
034a87ae1b3c8856d075fd235db5a799.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
034a87ae1b3c8856d075fd235db5a799.exe
Resource
win10v2004-20231222-en
General
-
Target
034a87ae1b3c8856d075fd235db5a799
-
Size
89KB
-
MD5
034a87ae1b3c8856d075fd235db5a799
-
SHA1
dc9371952d10833995f67c95b33ed7a4df5fb31e
-
SHA256
600593ebb267302d3436b8b17e80f49dfaa3595d36fb3bc70ca1c04a5d797bb8
-
SHA512
97a66957eddd9bb05373a499f2dabfce4eac4f81b8422ac907a3effaf7cadc8ad7dccafd0820832dac65c3ef8d0d99bce3cc3a9b1242257c746806a7d3477636
-
SSDEEP
768:WL3LzfkaLn2R8f+Rd4BDMVAaAF8tXID8wx8z+xSSJqM+fHfB68c8giIUq0YM7X:ybzRhNhFSYfsUnof/s8X3q0d7X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 034a87ae1b3c8856d075fd235db5a799
Files
-
034a87ae1b3c8856d075fd235db5a799.exe windows:4 windows x86 arch:x86
c77f1c25e8a865a9b044a14d3a212a0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
ExitProcess
GetDiskFreeSpaceA
FindVolumeClose
SearchPathA
VirtualProtect
GetTickCount
FindAtomA
GetConsoleFontSize
CreateThread
CloseHandle
lstrlenA
GetModuleHandleA
Sleep
ReleaseMutex
DeleteCriticalSection
FindClose
FindResourceExA
GetLastError
SetEvent
user32
CloseWindow
CreateMenu
DragDetect
DispatchMessageA
DialogBoxParamA
CreateWindowExA
CopyImage
GetScrollBarInfo
IsIconic
GetMessageA
EnableWindow
EndDialog
CopyIcon
GetKeyState
wshbth
WSHOpenSocket2
WSHJoinLeaf
WSHNotify
NSPStartup
WSHIoctl
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE