Static task
static1
Behavioral task
behavioral1
Sample
0fd817ed5bdcfbd337b33475196e4677.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fd817ed5bdcfbd337b33475196e4677.exe
Resource
win10v2004-20231215-en
General
-
Target
0fd817ed5bdcfbd337b33475196e4677
-
Size
375KB
-
MD5
0fd817ed5bdcfbd337b33475196e4677
-
SHA1
3191c25b0472ffd4c27bfd7713f369c5c9a55e83
-
SHA256
c4f91c9713ee0c7da4c996e8e10d7338c751517c0c9fff992ea6e147397fcb8d
-
SHA512
bbb270deef47823fb05213ba526651728d494501f953f2a4b462d70aa51de339675e5d661ada0fa2b171795537a347fe6e35d8b8d42793a449df6d6e9485b0fe
-
SSDEEP
6144:lVXGYtc7MowT2eFdOywz7HUIAo92MG5uSa9kMFgjKZCyLgNwP91fCkUOxKrNLLAt:9OAowRFd/wP08AMG5uPzFgjm9LgK9KVS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fd817ed5bdcfbd337b33475196e4677
Files
-
0fd817ed5bdcfbd337b33475196e4677.exe windows:4 windows x86 arch:x86
a1c275c2b8faa0ea0fa02b4ea51860b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
lstrlenA
lstrcatA
Sleep
SetLastError
CloseHandle
SetEvent
UnmapViewOfFile
CreateFileA
LocalUnlock
HeapCreate
LoadLibraryW
GetCurrentDirectoryA
CreateThread
GetComputerNameA
LocalFree
PulseEvent
GetSystemTime
GetCommandLineW
GetModuleHandleA
user32
DrawMenuBar
CallWindowProcA
IsWindow
CreateWindowExA
DrawEdge
GetDlgItem
GetDC
FillRect
DispatchMessageA
GetScrollBarInfo
CheckRadioButton
SetFocus
GetKeyState
clbcatq
CheckMemoryGates
UpdateFromAppChange
DowngradeAPL
SetupOpen
SetSetupOpen
timedate.cpl
CPlApplet
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 764KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ