Static task
static1
Behavioral task
behavioral1
Sample
23a2e758911ad82f907ae925be5ca1f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23a2e758911ad82f907ae925be5ca1f5.exe
Resource
win10v2004-20231222-en
General
-
Target
23a2e758911ad82f907ae925be5ca1f5
-
Size
88KB
-
MD5
23a2e758911ad82f907ae925be5ca1f5
-
SHA1
ab9fe8f72ee60e085130bcbd1d9c30c93342c6ba
-
SHA256
cffa022f9fba17700c285aaee590ab32e1087d9e1f5657126114205efb72fa01
-
SHA512
34edbdff4733b3bba98d1548951099bc9b9f51884883d315a82a234b96b738fd8961b200f2ae7c9e56af2b88c2eabf1cd1b0a9673e8b9fd157c91dd80079cea6
-
SSDEEP
768:aRloJOl9zBsMclGCk0tseKAajbcSKiRO2ofUKqlr5sQqdy4jy1FNpef5FQSABCUQ:knd35ZYseKJLJ/rKqtZ9NpAfbQp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23a2e758911ad82f907ae925be5ca1f5
Files
-
23a2e758911ad82f907ae925be5ca1f5.exe windows:5 windows x86 arch:x86
82fdd5ae09c079531709108571326d92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AlignRects
DrawTextA
AppendMenuW
GetDlgItem
DialogBoxParamA
IsWindow
CloseWindow
kernel32
OpenFileMappingA
CompareStringA
GlobalFree
FormatMessageA
lstrlenA
DeleteFileW
GetStdHandle
ExitProcess
ReadFile
FindClose
lstrcmpA
GetLocalTime
FlushFileBuffers
GetFileType
DeleteFileA
GetPriorityClass
ExitThread
HeapAlloc
GetLastError
advapi32
RegDeleteKeyA
RegEnumValueW
RegEnumKeyExA
RegCreateKeyW
RegCreateKeyA
RegEnumValueA
RegEnumKeyA
Sections
.1c92 Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.c7a8 Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0654 Size: 52KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.f6ad Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ