Static task
static1
Behavioral task
behavioral1
Sample
1c0ec356c01cc43a9fb2b82428dac1b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c0ec356c01cc43a9fb2b82428dac1b7.exe
Resource
win10v2004-20231215-en
General
-
Target
1c0ec356c01cc43a9fb2b82428dac1b7
-
Size
24KB
-
MD5
1c0ec356c01cc43a9fb2b82428dac1b7
-
SHA1
795096b381b6b130d07fdeb237ab2d52100057fc
-
SHA256
a9ddc11e49750388faefc5a872048d9f3f17e45b3e1d4cab5425cf47d2c7d51a
-
SHA512
76789d646d177c2e7d123116044ef4d2775184cade76d4826204eebd93c5ca2a3581cdbc23b8a9507e358f1682814e9573f535e76e25262bfe19bd50ea71da8d
-
SSDEEP
192:4Y6OSjaG26rAxOpzA/XskDFyFNTZtn9zHJ5T+nsbM61oyacMSszV:4Y6Og2I5zA/nDFcvx+nX61Q5S8V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c0ec356c01cc43a9fb2b82428dac1b7
Files
-
1c0ec356c01cc43a9fb2b82428dac1b7.exe windows:4 windows x86 arch:x86
6559d3cd093f259158873b96647246a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
GetProcAddress
FreeLibrary
LoadLibraryA
Sleep
GetSystemTime
GetTempPathA
CreateProcessA
DeleteFileA
Process32First
ExitProcess
GetCurrentProcessId
GetStartupInfoA
GetModuleHandleA
OpenProcess
CloseHandle
Process32Next
msvcrt
_strcmpi
_controlfp
??3@YAXPAX@Z
_except_handler3
fclose
fopen
fwrite
sprintf
fscanf
__CxxFrameHandler
_CxxThrowException
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
winmm
timeGetTime
psapi
GetModuleFileNameExA
ws2_32
inet_addr
shlwapi
PathFindFileNameA
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ