Static task
static1
Behavioral task
behavioral1
Sample
25e137426039a352875ef75a233bdfc2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25e137426039a352875ef75a233bdfc2.exe
Resource
win10v2004-20231215-en
General
-
Target
25e137426039a352875ef75a233bdfc2
-
Size
49KB
-
MD5
25e137426039a352875ef75a233bdfc2
-
SHA1
3b195d5c7dfe06eb577bb3a61889cee6d4fc40ad
-
SHA256
9616610b33afbc5ac803ceb47552f56058a207925f3a026b17971e9823c65cbc
-
SHA512
af1b0bc34c6f017f5a8583844b056f99df8718a0ceebdf78341952a23b58aa3ed3f827bc89bb183f017b1c6464406e7133b150de3cee7537a28293a765f5cf6d
-
SSDEEP
768:ZgrY7Gyy/lNtGNzUcuclRrA/UzaRn90qKiNewBtLIDit8BGeJAMpDWZrhNO:WrQVrUjx/maj0qK6eiIDB2cDWZr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25e137426039a352875ef75a233bdfc2
Files
-
25e137426039a352875ef75a233bdfc2.exe windows:5 windows x86 arch:x86
f25dc5ca707ba28239678a2d1c08e4a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MsgWaitForMultipleObjects
SetProcessWindowStation
CharLowerBuffA
GetClipboardData
CloseWindowStation
GetWindowTextW
GetDlgItemTextA
ExitWindowsEx
LoadCursorW
PeekMessageW
DrawIcon
GetMessageW
GetWindowThreadProcessId
CloseDesktop
FindWindowExW
GetCursorPos
EndDialog
GetDlgItemTextW
GetForegroundWindow
SetThreadDesktop
PeekMessageA
OpenWindowStationA
GetKeyState
ToUnicode
OpenDesktopA
DispatchMessageW
SendMessageW
GetKeyboardState
GetIconInfo
GetClassNameW
GetWindowLongW
GetDlgItem
GetMessageA
kernel32
SetThreadPriority
DeleteFileW
lstrcpyW
GetFileSizeEx
GetTickCount
ReadFile
GetTimeZoneInformation
MapViewOfFile
CreateEventW
OpenProcess
MoveFileExW
FindFirstFileW
GetComputerNameW
GetSystemTime
EnterCriticalSection
GetLocalTime
MultiByteToWideChar
CreateProcessW
InitializeCriticalSection
GlobalUnlock
GetExitCodeProcess
GetTempPathW
WriteProcessMemory
GetCurrentThreadId
GetTempFileNameW
SetLastError
SetFileTime
GetModuleHandleA
SetFilePointer
lstrcatA
HeapFree
SetEndOfFile
FindResourceW
GetFileTime
SystemTimeToFileTime
GetProcessTimes
GetThreadPriority
SetFileAttributesW
GetCurrentProcessId
ExpandEnvironmentStringsW
CreateFileMappingW
GetCommandLineA
lstrcpyA
lstrcmpiA
GetProcessHeap
GetDriveTypeW
GetVersionExW
lstrcatW
CloseHandle
DisconnectNamedPipe
lstrlenA
WriteFile
lstrlenW
ReleaseMutex
Sleep
ResetEvent
CreateThread
Sections
.psx Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pynox Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dshkz Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ