Static task
static1
Behavioral task
behavioral1
Sample
1c6998eda5aaf9265334390802d146b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c6998eda5aaf9265334390802d146b1.exe
Resource
win10v2004-20231215-en
General
-
Target
1c6998eda5aaf9265334390802d146b1
-
Size
7KB
-
MD5
1c6998eda5aaf9265334390802d146b1
-
SHA1
246a607a7142cdc3f79a9a8bdc5a00f673ebbf4c
-
SHA256
69febbcdc72effe2d79d66f7021ccc58fa5b728b0754cb95fc60ed4cd5ffedfc
-
SHA512
11a5a727f2024edad1b04c0a55b9ea57029ab48e8b6e9d091ce6e6461ef2350f34d9244266ede3bb366daa399ab110d65092532c516ce5f951916ac0a39d1720
-
SSDEEP
96:qIBhBM16a8iG4THpFQrmwNZral8qvstDLE3VSgWlfq7t:qIVU6a8H4LHQr/ra6qvoLE3VYlfq7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c6998eda5aaf9265334390802d146b1
Files
-
1c6998eda5aaf9265334390802d146b1.exe windows:4 windows x86 arch:x86
7dcf827d7b0db0eb3a28109e3a312411
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memcpy
strstr
NtQueryInformationProcess
RtlZeroMemory
shlwapi
PathFileExistsA
psapi
GetProcessImageFileNameA
kernel32
lstrlenA
lstrcpyA
lstrcmpiA
lstrcatA
OpenProcess
LoadLibraryA
CloseHandle
CreateMutexA
ExitProcess
FreeLibrary
GetCurrentProcess
GetLastError
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
GlobalFree
user32
UpdateWindow
TranslateMessage
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
GetMessageA
LoadCursorA
PostQuitMessage
RegisterClassExA
SetTimer
ShowWindow
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ