Static task
static1
Behavioral task
behavioral1
Sample
139228dba1250090e0208f1382c5a204.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
139228dba1250090e0208f1382c5a204.exe
Resource
win10v2004-20231215-en
General
-
Target
139228dba1250090e0208f1382c5a204
-
Size
19KB
-
MD5
139228dba1250090e0208f1382c5a204
-
SHA1
4965147c05c5c18eb62a8f2ee38f40dae498c4b7
-
SHA256
d253cf2405b2f0e63f5fbe93629a9e486c6fb6cb248c61227d57c48c36ad48ec
-
SHA512
4eefe7a758cc8440823a7b0736ae4d6d5461371e6009865121ee1ddd2b007fb1bf04ffec4f3410044fc323dca7942af6dc35b565f611092c3b0f2f31c2cc16cf
-
SSDEEP
384:hnXH8vJ7xcQNXJYh0FA4jahs3KuYXB4c0YINbul0fG34o:VMvJ7xcQN2eFavXB4c0XNql0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 139228dba1250090e0208f1382c5a204
Files
-
139228dba1250090e0208f1382c5a204.exe windows:4 windows x86 arch:x86
446aaf256bf2e5e84098b79a711ff297
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateEventA
GetFileAttributesA
lstrcatA
GetProcAddress
WaitForSingleObject
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
lstrlenA
SetFilePointer
LoadLibraryA
CreateFileA
SetEvent
WriteFile
ExitThread
GetVersionExA
CreateThread
ExitProcess
RtlUnwind
user32
PeekMessageA
CreateWindowExA
TranslateMessage
ShowWindow
MsgWaitForMultipleObjects
DestroyWindow
CharToOemA
SetThreadDesktop
CreateDesktopA
wsprintfA
DispatchMessageA
shell32
SHGetFolderPathA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ