Static task
static1
Behavioral task
behavioral1
Sample
0844ff718da1bc868502364d8d747bc6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0844ff718da1bc868502364d8d747bc6.exe
Resource
win10v2004-20231222-en
General
-
Target
0844ff718da1bc868502364d8d747bc6
-
Size
7KB
-
MD5
0844ff718da1bc868502364d8d747bc6
-
SHA1
ea0cc5d8fc1915f004a04ba2c45ed96cb8696135
-
SHA256
1f2ce8bc8402a5b62ec63797662a11deb7614adbb625ff8098659ba0742e6d03
-
SHA512
01c8d346fe16baea97258f207e038d32a5f3c5ed339301beb1033b0f98ff5927083d8cd588de9180890417bdc8b193517847c0b39a102e57bfd0f6f9bc71eedd
-
SSDEEP
192:XdOAG8HWuIXiFQqVpivsrA5ECm2SBW7le:nHWtSLVIvIAy9RW7l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0844ff718da1bc868502364d8d747bc6
Files
-
0844ff718da1bc868502364d8d747bc6.exe windows:4 windows x86 arch:x86
b0359257853ecb4c9fbd38a625715066
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
CreateThread
lstrcpyA
GetPrivateProfileStringA
CopyFileA
DeleteFileA
lstrcatA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
CreateDirectoryA
lstrlenA
advapi32
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE