Static task
static1
Behavioral task
behavioral1
Sample
14a44637a58694734ecebc0adc9c1b91.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14a44637a58694734ecebc0adc9c1b91.exe
Resource
win10v2004-20231215-en
General
-
Target
14a44637a58694734ecebc0adc9c1b91
-
Size
292KB
-
MD5
14a44637a58694734ecebc0adc9c1b91
-
SHA1
23ca2f8ff5533fb4c4a7aa126f1c5ac26c3237d5
-
SHA256
e88753e9b5dc9b3f255c007b65e6a263a7af9b20701d7dc6ee2b890a2159f2a7
-
SHA512
bbdba28e3f472a49a91912201b4b0a2cc1c40eb09755cbd3afd7ac866e8441a776072506e46456a0c69bd6099e8e8590b9182407f59471a0140547e2c669f09c
-
SSDEEP
6144:ZdH8uGT1IDETTq7xPRU3PtQnd8DSjVtus:ZdH8umaNPRWP6ndttus
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14a44637a58694734ecebc0adc9c1b91
Files
-
14a44637a58694734ecebc0adc9c1b91.exe windows:4 windows x86 arch:x86
4f3eb218f5117152444b5a7a0671d89d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE