Static task
static1
Behavioral task
behavioral1
Sample
1631929202172a26b64e5097572af909.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1631929202172a26b64e5097572af909.exe
Resource
win10v2004-20231215-en
General
-
Target
1631929202172a26b64e5097572af909
-
Size
395KB
-
MD5
1631929202172a26b64e5097572af909
-
SHA1
3174f94c348fd5b5d43505b49c5fcb020d3c81e2
-
SHA256
bd8810986579cbbf122ebbea172c9edc8dd1f8a842c7f5fe94e884f09b0ae077
-
SHA512
eb81c44a240bb80753094cf0a2edf8356be4bf2d2b1f5cc8bcdc3ab1817770cdca45cd6d4a1c74aaba457561d69968e9112950daedb6289d0dc9f2928499056b
-
SSDEEP
6144:EhRJG8KMBU+xo2e+5bYwCOMeruVipEMS1BWKak/wGY4mswgIxhX8784glf3fc:ELU+xa8bAe6V1RUKakIGEz8Tsf3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1631929202172a26b64e5097572af909
Files
-
1631929202172a26b64e5097572af909.exe windows:4 windows x86 arch:x86
5bb2f44cbc157e8f258c9b13cbc58dfc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CloseHandle
CreateFileW
lstrlenA
GetCommandLineW
GetCurrentDirectoryA
FindClose
CreateThread
lstrcpyA
HeapCreate
GetModuleHandleA
GetCurrentProcessId
PulseEvent
GetComputerNameA
UnmapViewOfFile
GetSystemTime
Sleep
LoadLibraryW
LocalFree
GlobalUnlock
user32
SetFocus
GetDlgItem
GetCaretPos
CallWindowProcA
DrawEdge
CheckRadioButton
GetDC
CreateWindowExA
DrawMenuBar
FillRect
IsWindow
CreateIcon
DispatchMessageA
cryptui
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
WizardFree
CryptUIDlgSelectCA
LocalEnroll
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 371KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ