Static task
static1
Behavioral task
behavioral1
Sample
28ce4216524638b8f249db86d4da6c0a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28ce4216524638b8f249db86d4da6c0a.exe
Resource
win10v2004-20231215-en
General
-
Target
28ce4216524638b8f249db86d4da6c0a
-
Size
368KB
-
MD5
28ce4216524638b8f249db86d4da6c0a
-
SHA1
068055e7b65c820f6d27cedb77bcace38127b220
-
SHA256
73ece1f898498cdcc62ae7b1472f3383a0660aafa551df7d9ab600006d85f33e
-
SHA512
05596ff3339422aed43f298948f4c38550dcf0a2d4e8da563dd8e20a58f5523085e55734ca1cd6588ded9b5c00c5e5a710af3953dc805c294da0a3738b6c40a4
-
SSDEEP
6144:Qk/yi2cT57c9aS3qnWRUhYGO1fryRSPZfh+u2FV3DmPDBPCQgAq:hDkaSwWihYV1frkSxf0D5mPNLgx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28ce4216524638b8f249db86d4da6c0a
Files
-
28ce4216524638b8f249db86d4da6c0a.exe windows:4 windows x86 arch:x86
2b5276a0150d4cf7dc5efdc2686c3193
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
ExitProcess
TlsSetValue
GetSystemDirectoryA
CreateSemaphoreA
VirtualQuery
EnterCriticalSection
VirtualFreeEx
GetModuleFileNameA
GetLastError
GetModuleHandleA
GetProcAddress
TlsGetValue
GetCurrentThread
GetSystemTime
IsBadWritePtr
user32
UpdateWindow
IsWindowVisible
GetDesktopWindow
LoadIconA
InSendMessage
LoadCursorA
LoadBitmapA
GetWindowInfo
LoadAcceleratorsA
gdi32
GetPixel
advapi32
AddAce
CopySid
shell32
DuplicateIcon
ole32
CoUninitialize
psapi
GetProcessMemoryInfo
avifil32
AVIStreamCreate
msvfw32
DrawDibEnd
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 645KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ