Static task
static1
Behavioral task
behavioral1
Sample
0950df246486243512feddcb86b03775.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0950df246486243512feddcb86b03775.exe
Resource
win10v2004-20231215-en
General
-
Target
0950df246486243512feddcb86b03775
-
Size
9KB
-
MD5
0950df246486243512feddcb86b03775
-
SHA1
137990c718a61c825342497625ea92cd84ca8bc9
-
SHA256
98cd388db788917e0a89b97e2ba77cd7d5226ef605bedc31bd347c1d22c2c09e
-
SHA512
da3f605744f392ff0e815d7151a44e04df5c2637c69887698ef77954c5585078eae51621470787d8322b0b8c4d8a7355ccd4431db63c2568f4299645d4d1f017
-
SSDEEP
192:qbTb70K0Pg04EVzMyXXDzYizKwhOsoqBu7lR:qfbAK0UE5FvYyKwh3u7l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0950df246486243512feddcb86b03775
Files
-
0950df246486243512feddcb86b03775.exe windows:4 windows x86 arch:x86
7788e3eb97c993d419b233e1df236e5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
lstrcatA
lstrcpyA
CreateThread
GetPrivateProfileStringA
CopyFileA
GetDriveTypeA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
CreateDirectoryA
lstrlenA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE