Static task
static1
Behavioral task
behavioral1
Sample
0fb3347edc0d2e24a05bbfc4dc0fa584.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fb3347edc0d2e24a05bbfc4dc0fa584.exe
Resource
win10v2004-20231215-en
General
-
Target
0fb3347edc0d2e24a05bbfc4dc0fa584
-
Size
390KB
-
MD5
0fb3347edc0d2e24a05bbfc4dc0fa584
-
SHA1
5fe5e3f61330435ff78983738f453ef47f6e8e44
-
SHA256
33c7894f8eb10e27177ed014dc1a4087abdf4a9e133666abbfc5e588858905a0
-
SHA512
0c8ace7bba385b05c00426c55a093f940268d4b7b1b8ebd716ab450f79d9577cc7a580f59f8539c6186c42ef9ee90a64f6d592049c4dba6c518bf2787f0bf4b8
-
SSDEEP
6144:+qwD+X1xQatU+1CEJp4XEt8l3aw9Y6zfJvkeitTDYWMtrDVmCfNuI2RINhoDPnre:sO1xm+QoK0t4K3gCTDYWGrYzt+NST
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fb3347edc0d2e24a05bbfc4dc0fa584
Files
-
0fb3347edc0d2e24a05bbfc4dc0fa584.exe windows:4 windows x86 arch:x86
1deea3c217c7ac2a75a9c5bb4e5c843d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
GetComputerNameA
LoadLibraryW
GetCommandLineW
FindVolumeClose
LocalFree
CloseHandle
CreateFileA
HeapCreate
ResetEvent
Sleep
LocalUnlock
FormatMessageA
GetTickCount
GetSystemTime
GetModuleHandleA
UnmapViewOfFile
lstrlenA
SetLastError
GetDiskFreeSpaceA
user32
CreateWindowExA
SetFocus
GetComboBoxInfo
DrawStateA
FillRect
DrawMenuBar
DispatchMessageA
GetDC
IsWindow
DrawEdge
CheckRadioButton
CallWindowProcA
GetDlgItem
advapi32
IsTokenUntrusted
FreeSid
RegDeleteKeyA
RegEnumValueA
RegCloseKey
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ