fRhXmbc0VJ@20
Static task
static1
Behavioral task
behavioral1
Sample
14118fa1ff16769d2d17190f2a18105c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14118fa1ff16769d2d17190f2a18105c.exe
Resource
win10v2004-20231215-en
General
-
Target
14118fa1ff16769d2d17190f2a18105c
-
Size
94KB
-
MD5
14118fa1ff16769d2d17190f2a18105c
-
SHA1
49eae350706564769880e3d60e2ea3c881d05f59
-
SHA256
e9bdfb5fb0b5e1323ba44776bcab72cef5b9a560f78dc9ae4020c7ac2dbf16bc
-
SHA512
96d4636bb6be341498d379d425f595ca81a39328882d9dc8557dcaf067495b7d6086855e7f54d7df191f8b96130bc31cfdb485fbb2bab8b966dddc910ddbaca8
-
SSDEEP
1536:Y7LLJnEIdGY16VVqy936E/rKChIKFZWR3cKZIjXa2Tl4m+:mJEhVVqOKEmCh/DKcS2OT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14118fa1ff16769d2d17190f2a18105c
Files
-
14118fa1ff16769d2d17190f2a18105c.exe windows:4 windows x86 arch:x86
53fb794ca00227146be0db77071a0a9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
SetHandleCount
ExitProcess
FindFirstFileA
GetModuleHandleA
lstrcmpiA
LocalReAlloc
lstrcmpA
VirtualQuery
SetLastError
GetUserDefaultLCID
IsBadHugeReadPtr
GetCurrentThread
DeleteCriticalSection
GetCommandLineA
GetDateFormatA
LocalFree
FreeLibrary
FormatMessageA
ResetEvent
SetErrorMode
lstrcpyA
LoadLibraryA
user32
IntersectRect
GetActiveWindow
GetWindowDC
GetSystemMenu
CharNextW
SetClassLongA
EnableWindow
LoadStringA
SetScrollRange
KillTimer
IsWindowEnabled
GetKeyboardLayout
ChildWindowFromPoint
GetWindowTextLengthA
CreateIcon
FrameRect
EnableMenuItem
ActivateKeyboardLayout
GetScrollPos
OpenIcon
GetSysColorBrush
IsIconic
CallNextHookEx
GetClassNameA
PostQuitMessage
SetWindowTextA
EqualRect
UnregisterClassA
GetMenu
GetKeyState
GetMenuItemCount
CheckMenuItem
SetWindowLongA
ClientToScreen
GetMenuState
CallWindowProcA
ReleaseDC
GetClientRect
SetWindowPos
SetCursor
GetKeyboardType
GetMenuStringA
CharNextA
GetSubMenu
CharUpperBuffA
GetLastActivePopup
LoadKeyboardLayoutA
IsMenu
CharLowerA
CharUpperA
GetWindowPlacement
InflateRect
UnhookWindowsHookEx
GetParent
PtInRect
GetPropA
IsZoomed
GetSysColor
DispatchMessageA
CharToOemA
SetTimer
OpenClipboard
OffsetRect
MapVirtualKeyA
gdi32
LineTo
shell32
SHFileOperationA
Shell_NotifyIconA
SHGetDiskFreeSpaceA
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dadata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ