Static task
static1
Behavioral task
behavioral1
Sample
241a9e4028dae03aea3a8e44c482c652.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
241a9e4028dae03aea3a8e44c482c652.exe
Resource
win10v2004-20231215-en
General
-
Target
241a9e4028dae03aea3a8e44c482c652
-
Size
160KB
-
MD5
241a9e4028dae03aea3a8e44c482c652
-
SHA1
b6c518636cec046961559aa6d0775aafd75029c8
-
SHA256
b27f05cc6732d1f982c832e2e28c9aa3e9c177cd1b9a6734287f9e4972bbfdab
-
SHA512
d7618e5f7989bbf2963824316534fec2c4dc45d7cd9bb5a3914c6e8a4152b97108dba940752dec7e0649f262cedaab56ba300dfef74d80eb43902cffb480ee28
-
SSDEEP
3072:TvJU8q8KCjW6slXu4kCPsSi9IWukjhGgfFxVnr97Ipm:Tv62Q+4kvIWuk9GgfFxVnJsw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 241a9e4028dae03aea3a8e44c482c652
Files
-
241a9e4028dae03aea3a8e44c482c652.exe windows:5 windows x86 arch:x86
a8c1c89b099d6f61acd6b1d384977dad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualAlloc
LoadLibraryExA
GetVersionExA
CloseHandle
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
GetStringTypeW
LCMapStringW
RtlUnwind
MultiByteToWideChar
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
CreateFileW
ReadFile
Sleep
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
SetFilePointer
GetFileSize
GetCurrentProcess
GetEnvironmentVariableW
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
VirtualQuery
user32
EndPaint
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadIconA
wsprintfA
GetClientRect
SendMessageA
BeginPaint
TranslateMessage
MessageBoxA
CreateWindowExA
DefWindowProcA
ShowWindow
DispatchMessageA
GetSystemMetrics
FindWindowA
LoadCursorA
gdi32
SelectObject
SetTextColor
CreateFontA
DeleteObject
TextOutA
CreatePen
Chord
GetTextMetricsA
GetStockObject
iphlpapi
GetTcpStatistics
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ