Static task
static1
Behavioral task
behavioral1
Sample
130f021b2060a3dd412081657189b62c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
130f021b2060a3dd412081657189b62c.exe
Resource
win10v2004-20231215-en
General
-
Target
130f021b2060a3dd412081657189b62c
-
Size
172KB
-
MD5
130f021b2060a3dd412081657189b62c
-
SHA1
14d689aba0bff29edf695b7dbfc4115b2a2c1321
-
SHA256
b3b40ec1201f02f41172cccc85e7ffd30c2967c65a2c5279de097bc2525e594c
-
SHA512
d1eecf8cdfddeac15d6c2da6d21b5deef7cde9f7a19144a4bf04c541e8e5810ea5a21306564f8e65335755c1b75bef632a896392730eccb878adb39985e57435
-
SSDEEP
3072:Xttb00cX1bWgWqaYVcoCsSRb1v5gUCnrG6WZ7tOz98nziuQIncna:d900I1bWq5ZCsSRbR2UCabE98uyca
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 130f021b2060a3dd412081657189b62c
Files
-
130f021b2060a3dd412081657189b62c.exe windows:4 windows x86 arch:x86
16c8d62275b1ea8f9489b61453590fdc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
GetPrivateProfileStructW
BackupRead
GetDateFormatA
FindNextFileW
MoveFileExA
ReadFileScatter
WriteConsoleInputW
SetNamedPipeHandleState
GetTempPathW
CompareStringW
LocalReAlloc
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
.code Size: 4KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ