Static task
static1
Behavioral task
behavioral1
Sample
164ce9bf2ac51ebee6997ed9326cbd9c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
164ce9bf2ac51ebee6997ed9326cbd9c.exe
Resource
win10v2004-20231215-en
General
-
Target
164ce9bf2ac51ebee6997ed9326cbd9c
-
Size
44KB
-
MD5
164ce9bf2ac51ebee6997ed9326cbd9c
-
SHA1
8593231f4558b9d9236d5eb8d00d50fb7e763434
-
SHA256
c69b31917f17d4c6abdfb58f04ba926655895fa2144f71223fa9c74c00143e30
-
SHA512
9d7ce32eb86493c603a219410e1cb37690bcf4dfbe91ef329f53f26a1b89973462eab6e4de6861c3c7f22432bd29b652af789df16d60f916991352fa69ec5631
-
SSDEEP
768:XF3dNN0Dmuy8Uf7zOYZVak77yCMGgycjczBkvlUdsgbYH3JeluTCj9BbeAENXtlv:X70DVyJZVp7eCpCOelUdsMY5iiCJBi/m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 164ce9bf2ac51ebee6997ed9326cbd9c
Files
-
164ce9bf2ac51ebee6997ed9326cbd9c.exe windows:4 windows x86 arch:x86
c0d5a15991fbbee70da0f6fdf7e75a36
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
FindAtomA
lstrcmpA
lstrlenA
GetModuleFileNameA
lstrcpynA
CreateMutexA
CloseHandle
GetVersion
GetTickCount
GetTempPathA
GetSystemTime
WriteFile
lstrcpyA
GetCommandLineA
CreateProcessA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
GetVersionExA
RtlUnwind
IsDebuggerPresent
user32
wsprintfA
ClientToScreen
GetCursorPos
GetCaretPos
EqualRect
GetWindowRect
IsWindowVisible
GetFocus
InflateRect
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE