Static task
static1
Behavioral task
behavioral1
Sample
165360a326700128295448c3751ae856.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
165360a326700128295448c3751ae856.exe
Resource
win10v2004-20231222-en
General
-
Target
165360a326700128295448c3751ae856
-
Size
297KB
-
MD5
165360a326700128295448c3751ae856
-
SHA1
ac8f2fb65c5102da31b96fdb778461f87527e48e
-
SHA256
6c0c8be80322fcf8ab8facdd2342c46993ad643071ec4e7c3bd5d91b6eafb419
-
SHA512
f7f7798f85bbcc1e66326dcbaf236456b08969d35fa165c53321adbeaf3411d9c254411add2e2fd8ac9b817ce5b5a05e852254a712fb2fd477aea07720126d14
-
SSDEEP
6144:1GpnCXM3lesxYTf+cYM/RB8PjqaksxjEXY6/agR6ucBxQZteh8g:CfVeaZcYdPj8s+POXyh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 165360a326700128295448c3751ae856
Files
-
165360a326700128295448c3751ae856.exe windows:4 windows x86 arch:x86
457e5947c1ba6eec9c42a1af68e4d07e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
SetEvent
CreateThread
SetLastError
CreateFileA
SuspendThread
GetCommandLineW
CloseHandle
GetExitCodeProcess
GetModuleHandleA
GetFileAttributesA
LocalFree
FindAtomA
ResetEvent
GetComputerNameA
GetSystemTime
GetTickCount
LoadLibraryW
GetDiskFreeSpaceW
HeapCreate
advapi32
CredFree
CreateServiceW
IsTokenRestricted
RegEnumValueA
RegEnumKeyExA
RegCloseKey
CloseEventLog
RegQueryValueA
RegCreateKeyExA
RegDeleteKeyA
GetUserNameW
GetFileSecurityA
GetLengthSid
cryptui
LocalEnroll
CryptUIDlgSelectCA
CryptUIDlgSelectStoreA
WizardFree
CryptUIDlgCertMgr
powercfg.cpl
CPlApplet
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 287KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ