Static task
static1
Behavioral task
behavioral1
Sample
42225c3a51b12d47a4258a08a247a083.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42225c3a51b12d47a4258a08a247a083.exe
Resource
win10v2004-20231215-en
General
-
Target
42225c3a51b12d47a4258a08a247a083
-
Size
870KB
-
MD5
42225c3a51b12d47a4258a08a247a083
-
SHA1
9ae960c7c69bad51da4ddbbbbc0c6600b40a0e4f
-
SHA256
8e73fe7dcd1e6f290f0492a064da433a7401a99be1dd9acb7f6a04dcf34ab7d3
-
SHA512
87c076ddcb6b17c90edbf16bd294308874c83debee817bfd71e24d10381df768822a71507c2f46cb3c85db3b9bbe7853e7feb525bc2de0ae61a1f37ba9b911bb
-
SSDEEP
12288:9pkuu4SughmvmaDtCN/LTSAUc24OszNb3MiTdBxFVCQyWxUYA5E:Tkuu4F0mrDC/LTTQv6qiTdBv7dzA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42225c3a51b12d47a4258a08a247a083
Files
-
42225c3a51b12d47a4258a08a247a083.exe windows:4 windows x86 arch:x86
a85eae6d2a1c2ceb1418bba3084ebc83
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetStartupInfoA
GetACP
CreateFileA
SuspendThread
GetModuleHandleA
TlsAlloc
ReleaseMutex
DeviceIoControl
GetFileAttributesA
CreateFileMappingA
lstrlenA
PulseEvent
IsDebuggerPresent
GetDriveTypeA
DeleteFileA
GetModuleFileNameW
TlsGetValue
IsBadStringPtrA
Sleep
user32
DispatchMessageA
IsWindow
GetIconInfo
PeekMessageA
IsZoomed
GetWindowLongA
FindWindowW
DestroyMenu
DrawTextW
LoadImageA
DispatchMessageA
CallWindowProcW
DestroyWindow
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
cryptui
WizardFree
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ