Static task
static1
Behavioral task
behavioral1
Sample
0da810c67b28a6fde93e4f3a087de0c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0da810c67b28a6fde93e4f3a087de0c1.exe
Resource
win10v2004-20231215-en
General
-
Target
0da810c67b28a6fde93e4f3a087de0c1
-
Size
815KB
-
MD5
0da810c67b28a6fde93e4f3a087de0c1
-
SHA1
69052076d4a512b318c8089753b4b568c6e0eb49
-
SHA256
62ed5c285410e56cf5fcdae43398b37f9ce0072f4b631216690539ac468f9b5a
-
SHA512
712e02c6370dd5cb3ae98b7fd3e27991aa4227ce9cceaefed66bdd41a48adcd3d492da02b3c65a6c4f671af2cc7e883aa7bed018cb0ba4b384f46cc66e2f4ac0
-
SSDEEP
12288:ybszVPkgusUJVZv4vFl3z1jGQCagrSbJ/xJFaaQ+GBRXDt/kN3iNJIg1UXAER:yozVsxJTEj2rcJvFHGP5/kN1+il
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0da810c67b28a6fde93e4f3a087de0c1
Files
-
0da810c67b28a6fde93e4f3a087de0c1.exe windows:4 windows x86 arch:x86
bb59ffbb1868ba9361209848b003ec5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetACP
CloseHandle
FindClose
CreateFileMappingA
GetConsoleCP
LocalFree
LoadLibraryExA
GetLastError
IsDebuggerPresent
GetPrivateProfileIntA
GlobalLock
IsBadReadPtr
FreeEnvironmentStringsA
CreateEventA
lstrlenW
LocalUnlock
GetModuleHandleA
GetStdHandle
CreateFileA
user32
GetMessageA
CheckMenuItem
GetIconInfo
GetDC
GetDlgItemTextA
IsWindow
EndDialog
SetFocus
GetDlgItem
DispatchMessageA
RedrawWindow
GetListBoxInfo
DialogBoxParamA
DrawIconEx
uxtheme
DrawThemeIcon
GetThemeColor
CloseThemeData
GetThemeMetric
EnableTheming
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ