Static task
static1
Behavioral task
behavioral1
Sample
0a3cf3a4e646242b28f1fe4523ca5f22.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a3cf3a4e646242b28f1fe4523ca5f22.exe
Resource
win10v2004-20231215-en
General
-
Target
0a3cf3a4e646242b28f1fe4523ca5f22
-
Size
742KB
-
MD5
0a3cf3a4e646242b28f1fe4523ca5f22
-
SHA1
712731e6d95528a413cdb4920a799dac940725f9
-
SHA256
32e8949bd3bffa57e9b9154b3ab5f9e6576b6355d810981a49e6856115749adc
-
SHA512
e70f54aa1aedb3cb511998a1e22bfa8e865ccf2a4704fed3fe585e6bdec341eaab56571c5238e42a285ce2c36e0011281e53a326ea4d47cb30fffdc85911dbce
-
SSDEEP
12288:moRMYrF3riKwOcUzMKUU9eEBExvzJOWtpPU3rIeF2QfAGBl2UXJfYSeeps+EnS8S:moRMaF+KwOcMhhHeJtpPUZFntH2yJgS/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a3cf3a4e646242b28f1fe4523ca5f22
Files
-
0a3cf3a4e646242b28f1fe4523ca5f22.exe windows:4 windows x86 arch:x86
79570b412dfd1761377da3bd03051a39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetPrivateProfileStringA
SuspendThread
LocalFree
ResumeThread
TlsGetValue
HeapCreate
GetConsoleAliasA
LocalFlags
WriteFile
lstrlenW
GetNumberFormatA
InitializeCriticalSection
LoadLibraryW
FindClose
CreateEventW
FindAtomA
GetDriveTypeW
GetEnvironmentVariableW
user32
EndDialog
CallWindowProcW
SetFocus
GetKeyboardType
DrawStateW
DrawTextA
IsWindow
DispatchMessageA
GetSysColor
CreateWindowExA
GetClassInfoA
GetClientRect
GetSysColor
srclient
EnableSR
EnableSR
EnableSR
EnableSR
EnableSR
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732KB - Virtual size: 731KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ