Static task
static1
Behavioral task
behavioral1
Sample
09acbc29a773770217696c4ff0e96a45.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09acbc29a773770217696c4ff0e96a45.exe
Resource
win10v2004-20231215-en
General
-
Target
09acbc29a773770217696c4ff0e96a45
-
Size
92KB
-
MD5
09acbc29a773770217696c4ff0e96a45
-
SHA1
21a967bdcefa1ce3d2df38d7bf426ac2cec452db
-
SHA256
a13c5b159b96a1a270a260617edce66c7a13cdd85ee3406032c25cdf1b3bf669
-
SHA512
be2f7b817b13083323d7fbc67a42fe6d65766b64503a2361108a8856396a7aae863445d6e47c624603f9348ca68da3a8c758592bc01b7e22773436d7e23b7d97
-
SSDEEP
1536:MpuOO/aZ4LR8LbtoUVuRG5etgBaxXmB+EoC+1xv9tqGNiNW0Ne+zYJXza:MpPO/xLR8LbtVIAeCoC+D10NWy0Xu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 09acbc29a773770217696c4ff0e96a45
Files
-
09acbc29a773770217696c4ff0e96a45.exe windows:5 windows x86 arch:x86
5276faf7cf9de9ff90cdef1a52702b6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr90
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_unlock
__set_app_type
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
??2@YAPAXI@Z
exit
??3@YAXPAX@Z
__dllonexit
malloc
_CxxThrowException
__CxxFrameHandler3
memset
kernel32
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleA
LoadLibraryA
GetProcAddress
Sleep
FreeLibrary
GetCurrentProcessId
GetTickCount
lstrlenA
GetSystemTimeAsFileTime
user32
SendMessageA
FindWindowA
MessageBoxA
shlwapi
wnsprintfA
wvnsprintfA
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CODE Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ