Static task
static1
Behavioral task
behavioral1
Sample
0ddacdbd39602c4781377561072d9b05.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ddacdbd39602c4781377561072d9b05.exe
Resource
win10v2004-20231222-en
General
-
Target
0ddacdbd39602c4781377561072d9b05
-
Size
238KB
-
MD5
0ddacdbd39602c4781377561072d9b05
-
SHA1
6e5972f41e211e2d56a22f4cc3be6a06b1418537
-
SHA256
93138b7bf45b7b598b1f31d2f28d91e5d1e63ae2a70de14154746ad00ee4a9e4
-
SHA512
cdc371f004999a0cf363eab6faee1a6bb748388c8308fbca7893ff05a01c6ad123a29dc5b205a6d696174af41f93e802f856289f03e89a6771aff713d662cd2d
-
SSDEEP
6144:FtxR2h5ffpDApuB4ktkDI2Lq25kOaB4YXdqd7:Fvoh51ApueNLqSalX47
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ddacdbd39602c4781377561072d9b05
Files
-
0ddacdbd39602c4781377561072d9b05.exe windows:4 windows x86 arch:x86
498f1c3b1cfdd1f6431d4d43ce7429d6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetKeyboardType
PeekMessageA
kernel32
GetModuleFileNameA
GetEnvironmentVariableA
ExitProcess
FormatMessageA
GetLastError
SetLastError
GetProcAddress
VirtualProtect
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
GetModuleFileNameW
GetVersionExA
VirtualFree
VirtualAlloc
GlobalAlloc
SetFilePointer
ReadFile
CreateFileA
DeleteCriticalSection
TlsSetValue
WriteFile
Sleep
advapi32
RegQueryValueExA
oleaut32
SysFreeString
SafeArrayPtrOfIndex
Sections
.text Size: 20KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE