Static task
static1
Behavioral task
behavioral1
Sample
210288d026baa964fde4050bd4a038ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
210288d026baa964fde4050bd4a038ed.exe
Resource
win10v2004-20231215-en
General
-
Target
210288d026baa964fde4050bd4a038ed
-
Size
1.6MB
-
MD5
210288d026baa964fde4050bd4a038ed
-
SHA1
b32615a34900a87fb437de1f5dc2c6942ef83145
-
SHA256
dd0307edbd1a45874bfca4b8ff729a31d3314f6992c8c658ed9edd2f215e7b2d
-
SHA512
232e38093e02e02ac49579e4cea453dce9507ebdc5dd469f7a77aaaf2fa508519536621615885d8e9935f283381f124e75fce607280c31f454e2ffc42c56c9fb
-
SSDEEP
49152:T39ID/IZR92Dq60EpxT7Nwje8m+vSbQAdjiS:yD/IgDqUwpmySvjR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 210288d026baa964fde4050bd4a038ed
Files
-
210288d026baa964fde4050bd4a038ed.exe windows:4 windows x86 arch:x86
9165ea3e914e03bda3346f13edbd6ccd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxA
wsprintfA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
SE Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ