Static task
static1
Behavioral task
behavioral1
Sample
0fa3a4d16fea8abb449ecd4fdc0b1d71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fa3a4d16fea8abb449ecd4fdc0b1d71.exe
Resource
win10v2004-20231215-en
General
-
Target
0fa3a4d16fea8abb449ecd4fdc0b1d71
-
Size
326KB
-
MD5
0fa3a4d16fea8abb449ecd4fdc0b1d71
-
SHA1
21b582b52eea519979271920e336242fad0e5a42
-
SHA256
52fae53b8e8955a33258bfa7f482e510780844b6a12fd6a0fefade6611270b4a
-
SHA512
653db35912e8f8788e27130ee12c8d949e2a88ef0c1fef034361f2e224cfcc35d0c73bbd7e3166286c015f759301b1c8af3926a097a7376c558145250ed0dc7c
-
SSDEEP
6144:BrdjssyndtXc3IsKgxpTOVRip1daN7VC5u0f8oZU5q7dCXhb:BRAIIngrBpfUF6Nkb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fa3a4d16fea8abb449ecd4fdc0b1d71
Files
-
0fa3a4d16fea8abb449ecd4fdc0b1d71.exe windows:5 windows x86 arch:x86
2aeee404536aa8f634d8ff7b5217f061
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetUserDefaultUILanguage
SetEndOfFile
HeapAlloc
GetTempPathW
GetSystemTimeAsFileTime
CreateFileMappingW
WriteFile
CopyFileW
OpenProcess
CreateMutexW
GetCurrentThread
CloseHandle
lstrlenA
SetFileTime
SetLastError
GetCommandLineA
GetModuleHandleA
FindFirstFileW
lstrcpynW
CreateThread
UnmapViewOfFile
SetEvent
lstrcmpiA
GlobalLock
SetThreadPriority
EnterCriticalSection
GetDriveTypeW
GetSystemTime
ReleaseMutex
FindClose
user32
DispatchMessageW
Sections
.upyz Size: 35KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zil Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zelut Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ