Static task
static1
Behavioral task
behavioral1
Sample
a2d5f9d95aabd2739f5776aeda15a98c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a2d5f9d95aabd2739f5776aeda15a98c.exe
Resource
win10v2004-20231215-en
General
-
Target
a2d5f9d95aabd2739f5776aeda15a98c.exe
-
Size
390KB
-
MD5
a2d5f9d95aabd2739f5776aeda15a98c
-
SHA1
ebb5aab5b2708ac2990a2b6026fbd69d99d40379
-
SHA256
a05e6c5b0e6372ce2dcb9c33df12ede35d9726f72996e9c34c9801ddc53deab5
-
SHA512
06d17f96dfeb0ead985534f786af6dec3ffaa5f26782d90d00773eaacee9e2820ff68d583214eb2239935f5024c0e824ca0595ac5a0f8b8e9fcec7dc5c1d1cf4
-
SSDEEP
6144:kqwD+X1xQatU+1CEJp4XEt8l3aw9Y6zfJvkeitTDYWMtrDVmCfNuI2RINhoDPnr:GO1xm+QoK0t4K3gCTDYWGrYzt+NST
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2d5f9d95aabd2739f5776aeda15a98c.exe
Files
-
a2d5f9d95aabd2739f5776aeda15a98c.exe.exe windows:4 windows x86 arch:x86
5840266f88c6a4cb179e24026d63c088
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
HeapCreate
GetModuleHandleA
GetComputerNameA
LocalUnlock
GetTickCount
GetDiskFreeSpaceA
CloseHandle
LocalFree
Sleep
LoadLibraryW
FindVolumeClose
GetSystemTime
SetLastError
CreateFileA
CreateThread
FormatMessageA
ResetEvent
UnmapViewOfFile
lstrlenA
user32
GetDlgItem
DrawMenuBar
DrawEdge
CheckRadioButton
CreateWindowExA
DispatchMessageA
DrawStateA
FillRect
CallWindowProcA
SetFocus
IsWindow
GetDC
GetComboBoxInfo
advapi32
RegEnumValueA
RegDeleteKeyA
IsTokenUntrusted
FreeSid
RegCloseKey
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ