Static task
static1
Behavioral task
behavioral1
Sample
0810622da6bdb4621060ea909583a0c4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0810622da6bdb4621060ea909583a0c4.exe
Resource
win10v2004-20231215-en
General
-
Target
0810622da6bdb4621060ea909583a0c4
-
Size
488KB
-
MD5
0810622da6bdb4621060ea909583a0c4
-
SHA1
2953389d0f8eda97d0d1e7b4970ce784fef6fc6b
-
SHA256
59ca9c22d6cc0643d6527054c4eddf0dd20a62c1eb4132c4d6d0fbe0c0dec6d2
-
SHA512
7e4883ba3f7089f0ea48983b3af582f25d43928e14c6b31b9c97805295ff53b21ef4daae60c2ac2c6145e41080df478cfc8a2537dd9270ffb16427ab36d649df
-
SSDEEP
12288:/VCEqB0Aikdv7xL5mAoKMmqYahHEvJylgZ8toE0iC:/VC5yIdv7xbqYahH8yGZj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0810622da6bdb4621060ea909583a0c4
Files
-
0810622da6bdb4621060ea909583a0c4.exe windows:4 windows x86 arch:x86
994e45c60cf3434913d7275aedffa258
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClipboardData
GetKeyboardType
DestroyMenu
GetWindowRect
CreateDialogIndirectParamW
DeleteMenu
DlgDirListW
SetRect
LoadCursorA
SetWindowsHookExA
GetUpdateRect
RegisterClassA
RegisterClassExA
comctl32
InitCommonControlsEx
kernel32
TlsGetValue
GetVersionExA
HeapFree
GetTimeZoneInformation
GetUserDefaultLCID
IsValidLocale
VirtualFree
HeapReAlloc
LCMapStringA
UnhandledExceptionFilter
DeleteCriticalSection
LeaveCriticalSection
GetModuleFileNameA
EnumSystemLocalesA
SetFilePointer
GetCurrentThread
GetLocaleInfoW
IsValidCodePage
HeapSize
ReadFile
TlsAlloc
FreeEnvironmentStringsW
LoadLibraryA
WriteProfileStringA
CompareStringW
InterlockedExchange
DeleteFiber
GetOEMCP
GetFileType
WriteFile
ExitProcess
LCMapStringW
RtlUnwind
InitializeCriticalSection
GetCurrentProcessId
SetStdHandle
IsBadWritePtr
FlushFileBuffers
OpenMutexA
VirtualAllocEx
GetCurrentProcess
SetEnvironmentVariableA
VirtualAlloc
GetStringTypeA
SetThreadContext
GetStartupInfoA
VirtualQuery
GetSystemInfo
GetCurrentThreadId
WaitNamedPipeA
GetProcAddress
GetTimeFormatA
TerminateProcess
SetCurrentDirectoryA
RemoveDirectoryW
GetNamedPipeInfo
SetLastError
GetTempPathA
GetTickCount
GetConsoleTitleW
GetEnvironmentStringsW
GetModuleHandleA
EnterCriticalSection
GetStdHandle
HeapDestroy
GetSystemTimeAsFileTime
GetProcessShutdownParameters
VirtualProtect
GetCPInfo
GetACP
HeapAlloc
lstrcpynA
GetCommandLineA
CompareStringA
SetHandleCount
FreeEnvironmentStringsA
LocalSize
GetEnvironmentStrings
TlsFree
MultiByteToWideChar
GetDateFormatA
TlsSetValue
CreateMutexA
LoadLibraryW
CloseHandle
QueryPerformanceCounter
WideCharToMultiByte
GetLocaleInfoA
GetLastError
HeapCreate
GetStringTypeW
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ