Static task
static1
Behavioral task
behavioral1
Sample
1fa8c6ad54f2f436bbf7e6a3ea82444f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1fa8c6ad54f2f436bbf7e6a3ea82444f.exe
Resource
win10v2004-20231215-en
General
-
Target
1fa8c6ad54f2f436bbf7e6a3ea82444f
-
Size
299KB
-
MD5
1fa8c6ad54f2f436bbf7e6a3ea82444f
-
SHA1
24223f6008621e0fd8d6b3470d09afad9ee16382
-
SHA256
ec519ba5b035fed3ac1ba3df4432c4575220ec7d608903170cc784bab4495cd5
-
SHA512
e8d90f45c6cb954db824d93564af900ca4c3d233592afedfc86a847250374e11143550a3f63e18bc2dfc28bd0bf756714303df3f8812205a8a0e7614edc19320
-
SSDEEP
3072:g99NZIuALltbOOgTl5PTn96FqBbd2Pk7+jd2TTKFurSC+da:UeLXbkoq9d2Pk7+jATKFzCL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fa8c6ad54f2f436bbf7e6a3ea82444f
Files
-
1fa8c6ad54f2f436bbf7e6a3ea82444f.exe windows:4 windows x86 arch:x86
c8c5bc410b282495dd905c54df8d4f8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDC
GetDesktopWindow
GetSystemMetrics
CharNextA
kernel32
Sleep
GetCommandLineA
SetLastError
GetProcessHeap
SetCurrentDirectoryA
MulDiv
GetCommandLineW
GetWindowsDirectoryA
IsDebuggerPresent
RemoveDirectoryA
lstrcmpA
GetTickCount
QueryPerformanceCounter
GetThreadLocale
GetModuleHandleA
GetVersion
lstrcmpiA
GetUserDefaultLangID
GetModuleHandleW
GlobalFindAtomW
CopyFileA
GetCurrentThreadId
LoadLibraryW
GetACP
lstrlenW
GetCurrentThread
GetStartupInfoA
GetCurrentProcessId
GetConsoleOutputCP
GetDriveTypeA
DeleteFileA
GetCurrentProcess
DeleteFileW
GetLastError
lstrcmpiW
lstrlenA
GlobalFindAtomA
GetOEMCP
VirtualAlloc
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE