Static task
static1
Behavioral task
behavioral1
Sample
03d341c70f83c8c9ea37a9d3d5b61134.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03d341c70f83c8c9ea37a9d3d5b61134.exe
Resource
win10v2004-20231215-en
General
-
Target
03d341c70f83c8c9ea37a9d3d5b61134
-
Size
1.6MB
-
MD5
03d341c70f83c8c9ea37a9d3d5b61134
-
SHA1
c66d585ce838861b0ab784b360c3c537e658a6e6
-
SHA256
0afe9f3dcb32458724c3ec09ec820698d42f24e92e5c65139d638cda9094443a
-
SHA512
8e21d133d96b2b1f6b071398734b9408a6cd0186edc8c3bddeee6a2d524f733e4d4d72f8632d01c2dad9fc31726068afacd758f191e539aefd863926f79d6d01
-
SSDEEP
6144:gKY73HEf5jRg6/PD4xEy1UF4RJfAGc4nHwCLmJeE3hhYzYy4tFeHJCUGM4PswlPj:BVRg6XDEpQGc49ipWzPeEcK4VwAGjiSi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03d341c70f83c8c9ea37a9d3d5b61134
Files
-
03d341c70f83c8c9ea37a9d3d5b61134.exe windows:4 windows x86 arch:x86
e3375863abbd62135baac702f4deff18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentDirectoryA
GetShortPathNameA
FindResourceExA
EnumResourceLanguagesA
ResumeThread
WriteProcessMemory
LocalFree
GetCurrentThreadId
SetFileAttributesA
CreateDirectoryA
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
InitializeCriticalSection
HeapValidate
lstrcatA
WideCharToMultiByte
RtlUnwind
GetStringTypeW
user32
SetFocus
AdjustWindowRectEx
DefWindowProcA
advapi32
RegCreateKeyA
RegSetValueA
RegCloseKey
ole32
CoRegisterClassObject
ReadClassStm
Sections
0 Size: 356KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
4 Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
5 Size: 7KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
6 Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7 Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
8 Size: 48KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
10 Size: 10KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE