Static task
static1
Behavioral task
behavioral1
Sample
0894c798a23a58b5d0dacc321321e30e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0894c798a23a58b5d0dacc321321e30e.exe
Resource
win10v2004-20231215-en
General
-
Target
0894c798a23a58b5d0dacc321321e30e
-
Size
77KB
-
MD5
0894c798a23a58b5d0dacc321321e30e
-
SHA1
078ef797b1b0432b00cc61295b928f3b851f98f0
-
SHA256
d3a9b71eb51107410e0344083ffe4e666345f9f2644e8680a04a9e5a05cd78cd
-
SHA512
5db8254df9822bf41659bd423f097c329e7e227a498eae48c3b85cd2167f0e9c9980064a47e1110bc732ae40a814f848b2a9fa6a306fa4813396a3ce6a1eff16
-
SSDEEP
1536:jr8a9suHO736pSpCgK7MF5kWVor6kAOFfj+b2gv736p:P8a9DO7qpSpnF5kWVjkAOFCTv7qp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0894c798a23a58b5d0dacc321321e30e
Files
-
0894c798a23a58b5d0dacc321321e30e.exe windows:4 windows x86 arch:x86
250a0421fda390a51b0edbca39ee0307
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
CloseHandle
ReadFile
FindNextFileA
GetFileSize
CreateFileA
lstrcpyA
GetVersionExA
DeleteFileA
MultiByteToWideChar
lstrcatA
CreateDirectoryA
GetModuleFileNameA
GetLastError
GetCurrentProcess
SetFileAttributesA
FindClose
RemoveDirectoryA
GetFileAttributesA
GetShortPathNameA
MoveFileA
CopyFileA
GetWindowsDirectoryA
CreateDirectoryExA
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
FlushFileBuffers
IsDBCSLeadByte
GetProcAddress
SetCurrentDirectoryA
lstrcpynA
SetEndOfFile
ExitProcess
GetModuleHandleA
WriteFile
GetFileType
SetStdHandle
GetCPInfo
GetOEMCP
GetStdHandle
UnhandledExceptionFilter
RtlUnwind
GetACP
VirtualAlloc
VirtualFree
SetFilePointer
GetEnvironmentStrings
SetEnvironmentVariableA
GetCurrentDirectoryA
GetVersion
WideCharToMultiByte
GetStartupInfoA
GetCommandLineA
user32
CharNextA
PostMessageA
MessageBoxA
LoadStringA
ReleaseDC
FindWindowA
SetWindowPos
EndDialog
GetDC
GetWindowRect
DialogBoxParamA
SetDlgItemTextA
CheckRadioButton
CharToOemA
wsprintfA
GetDesktopWindow
IsDlgButtonChecked
gdi32
GetDeviceCaps
advapi32
RegOpenKeyExA
RegSetValueA
RegQueryValueA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
Sections
��t Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ