Static task
static1
Behavioral task
behavioral1
Sample
1d5336cb41fe9f9b8b4fcf364ebcbed5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d5336cb41fe9f9b8b4fcf364ebcbed5.exe
Resource
win10v2004-20231215-en
General
-
Target
1d5336cb41fe9f9b8b4fcf364ebcbed5
-
Size
14KB
-
MD5
1d5336cb41fe9f9b8b4fcf364ebcbed5
-
SHA1
63267dda71edc427dbbf6c96da187515fb9c49a8
-
SHA256
e8f151aae963d4609fdc6e1be73bcb9dc1c166ab29edca4becb426a328aa5707
-
SHA512
ec79cc7ea01258e9ce5bc9cc669b18e0f8ba476d2d0324c1834c88a61de99e969ecdba7e5436b32e2bed6ba2fadd824c61b8626babc40d0ea687e12436db2f1e
-
SSDEEP
192:bP+mSvpyFLe/l/fMGmK2DBxqmy//BtkPzPThY68F5KyaQIlffsnIlvtNC1E/v:TagK9MnKb2BbAnIlQIlvtNC1Iv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d5336cb41fe9f9b8b4fcf364ebcbed5
Files
-
1d5336cb41fe9f9b8b4fcf364ebcbed5.exe windows:4 windows x86 arch:x86
20fd8a1ff2b818b1b5561796111744b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
OpenEventA
SetEvent
Sleep
DeleteFileA
lstrcatA
lstrcpyA
GetCurrentProcess
GetModuleHandleW
CloseHandle
GetProcAddress
FreeLibrary
ResetEvent
PulseEvent
GetProcessHeap
HeapReAlloc
VirtualAlloc
ExitProcess
GetModuleHandleA
GetCommandLineA
WriteFile
OpenProcess
HeapAlloc
HeapFree
CreateFileA
GetFileAttributesA
GetTempPathA
CompareStringA
Process32First
CreateToolhelp32Snapshot
TerminateProcess
RtlUnwind
InterlockedExchange
VirtualQuery
user32
MessageBoxA
wsprintfA
CharToOemA
ExitWindowsEx
AnyPopup
ShowWindow
GetForegroundWindow
IsChild
GetParent
advapi32
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE