Static task
static1
Behavioral task
behavioral1
Sample
18ce292c9f75e77e1d3061c2c2f42cba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18ce292c9f75e77e1d3061c2c2f42cba.exe
Resource
win10v2004-20231215-en
General
-
Target
18ce292c9f75e77e1d3061c2c2f42cba
-
Size
13KB
-
MD5
18ce292c9f75e77e1d3061c2c2f42cba
-
SHA1
e29234af1030f8889147a03b644f0548a03b57e2
-
SHA256
a5c2d64f41b6d19b3e8b33379f68c2f5500a23985db7ed31cb420a0211835031
-
SHA512
30e08564e1b7ced430ad710ba8306ce5d65566019f62e23ad87f7e2f34ce762609c1b07e6db4d1d5d4bf27b513dba9137e1e924ced2f1fdb597a1da2d714e27f
-
SSDEEP
384:tWeo161skgSyt0sTDFLFdkRFkSgLxMkKOOMu:voAhf5iDHdkTk1hKRM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18ce292c9f75e77e1d3061c2c2f42cba
Files
-
18ce292c9f75e77e1d3061c2c2f42cba.exe windows:4 windows x86 arch:x86
42600fecd8bc094aca2d24f65cb903bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowThreadProcessId
FindWindowA
kernel32
GetWindowsDirectoryA
lstrcatA
WriteProcessMemory
WinExec
CloseHandle
CreateRemoteThread
ExitProcess
GetProcAddress
LoadLibraryA
OpenProcess
TerminateProcess
VirtualAllocEx
VirtualFreeEx
WaitForSingleObject
Sections
.text Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 618B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 386B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�ŵ����� Size: 10KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE