Static task
static1
Behavioral task
behavioral1
Sample
040a040695b0c846e254d0551725cfc0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
040a040695b0c846e254d0551725cfc0.exe
Resource
win10v2004-20231215-en
General
-
Target
040a040695b0c846e254d0551725cfc0
-
Size
88KB
-
MD5
040a040695b0c846e254d0551725cfc0
-
SHA1
4451f8a16295f27b5543074aebd59db5863dd4c3
-
SHA256
430725dc5527931eee681afbd32aa7a144759390a7c35ac91349ba98959ba707
-
SHA512
1c77032f3e949a3deece4aa0fd9dff3e65c4e14ae1408776756e3dc2f360a62cad68c81cff42d65653ecdcca741b3e2b2c38c46f160ac4530048fe413334f6c7
-
SSDEEP
768:6RloJOl9zBsMclGCk0tseKAajbcSKiRO2ofUKqlr5sQqdy4jy1FNpef5FQSABCUQ:End35ZYseKJLJ/rKqtZ9NpAfbQp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 040a040695b0c846e254d0551725cfc0
Files
-
040a040695b0c846e254d0551725cfc0.exe windows:5 windows x86 arch:x86
82fdd5ae09c079531709108571326d92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AlignRects
DrawTextA
AppendMenuW
GetDlgItem
DialogBoxParamA
IsWindow
CloseWindow
kernel32
OpenFileMappingA
CompareStringA
GlobalFree
FormatMessageA
lstrlenA
DeleteFileW
GetStdHandle
ExitProcess
ReadFile
FindClose
lstrcmpA
GetLocalTime
FlushFileBuffers
GetFileType
DeleteFileA
GetPriorityClass
ExitThread
HeapAlloc
GetLastError
advapi32
RegDeleteKeyA
RegEnumValueW
RegEnumKeyExA
RegCreateKeyW
RegCreateKeyA
RegEnumValueA
RegEnumKeyA
Sections
.1c92 Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.c7a8 Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0654 Size: 52KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.f6ad Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ