Static task
static1
Behavioral task
behavioral1
Sample
1d083086a26211a1d728a9ff2dcd7a85.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d083086a26211a1d728a9ff2dcd7a85.exe
Resource
win10v2004-20231215-en
General
-
Target
1d083086a26211a1d728a9ff2dcd7a85
-
Size
72KB
-
MD5
1d083086a26211a1d728a9ff2dcd7a85
-
SHA1
08b1a7f3d2c601730559b5b6d6f487f4757df2df
-
SHA256
8d5b849a3d89e517622c0bd4ba7553ed0feb156e18d9accf60c7169156d8fde6
-
SHA512
e0d45ff35eb9842005a3e5d1c3f0acd0326edcb7c5d560c611417188757e91168345e2915f7da5bdccde32ab9099c8dfa4b3fe97adbb2349e59258db04112545
-
SSDEEP
1536:Hh9ZKSv1JzK0XmRoIPtxkt0gSz8GDWzJIlK9:Hh94wdyoIlAu2JIlK9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d083086a26211a1d728a9ff2dcd7a85
Files
-
1d083086a26211a1d728a9ff2dcd7a85.exe windows:4 windows x86 arch:x86
dc8d4cbf70c5b853bb3314de9914f590
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetSystemTimeAsFileTime
GetPrivateProfileSectionA
FlushFileBuffers
SetStdHandle
CreateFileMappingA
GetCurrentThreadId
GetLastError
Sleep
GetModuleFileNameA
GetCompressedFileSizeA
SetFileAttributesA
GetShortPathNameA
CreateProcessA
CreateDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
GetVersionExA
CreateToolhelp32Snapshot
CloseHandle
Process32First
Process32Next
OpenProcess
WideCharToMultiByte
RaiseException
RtlUnwind
HeapFree
GetCommandLineA
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
ExitProcess
TerminateProcess
GetCurrentProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetACP
GetOEMCP
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
InterlockedExchange
SetFilePointer
advapi32
SetServiceStatus
RegQueryInfoKeyA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
ControlService
DeleteService
StartServiceA
QueryServiceStatus
CreateServiceA
ChangeServiceConfig2A
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeregisterEventSource
RegQueryValueExA
GetUserNameA
CreateProcessAsUserA
OpenProcessToken
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ