Static task
static1
Behavioral task
behavioral1
Sample
134eef0cae81290d507acc02b3858c7f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
134eef0cae81290d507acc02b3858c7f.exe
Resource
win10v2004-20231215-en
General
-
Target
134eef0cae81290d507acc02b3858c7f
-
Size
127KB
-
MD5
134eef0cae81290d507acc02b3858c7f
-
SHA1
10399b6565949a413331d59dc93d7a8cce178519
-
SHA256
32bdc058fcde199c94c7b0ef711775a622208b509bf729b77923755b6a214ab9
-
SHA512
a84fd53cdc9d992738e8ef2bd8bc9a350a2d8ac25b6eb739d10aa2447bc6b0ecbe6771ed890ea07eb01506a9fcae806812329599a572b47114d5a3392cd1bb09
-
SSDEEP
1536://zYNeLZ9iECnLTkzZRVkS+E8O0Nxu/7oKslhxtTUzM+SEusRG1uDVBf7KCtbVrq:z9CDHkzZjoVffQSEuZeVt7KG2ZR3cW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 134eef0cae81290d507acc02b3858c7f
Files
-
134eef0cae81290d507acc02b3858c7f.exe windows:4 windows x86 arch:x86
10ff2d6edc5451a9a5bd87c1c2edb7f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
ExitThread
FindResourceA
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetProcessAffinityMask
GetProcessWorkingSetSize
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
LoadLibraryA
QueryPerformanceCounter
SetHandleCount
SetProcessWorkingSetSize
SetUnhandledExceptionFilter
VirtualAlloc
VirtualProtect
VirtualQueryEx
msvcrt
strcpy
strncmp
strcmp
wscanf
atoi
fseek
fopen
wcscpy
user32
OffsetRect
IntersectRect
InsertMenuA
GetPropA
comctl32
CreateStatusWindowA
InitCommonControls
CreateMappedBitmap
Sections
.text Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ