Static task
static1
Behavioral task
behavioral1
Sample
keke.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
keke.exe
Resource
win10v2004-20231215-en
General
-
Target
4a52b4e2022024e5a940015c34931bd9
-
Size
11KB
-
MD5
4a52b4e2022024e5a940015c34931bd9
-
SHA1
a8a695bfee836be37c2e57a840f0bfbaaa587959
-
SHA256
a216840837c876c4d7aeaa5d5fec2549f99e90de5eed555a57a4dada00ff6f0f
-
SHA512
19acddad44f96f963629099a6773717011939f41bdceeab34d91947d10ff65379b76420fc913b4b96cc5cd1d8c10e1c56762d357104723f3aa035a217c1f3513
-
SSDEEP
192:WT0L0ij+FBEY1n2fdsBS2yyyi6+MdpcD3pFEEvGKDyNpE9pHBMcLaO:xL0iiP8sEyypq3pFzDd9jwO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/keke.exe
Files
-
4a52b4e2022024e5a940015c34931bd9.zip
-
keke.exe.exe windows:4 windows x86 arch:x86
0d4955ed48fce0e2ed042f0bab638d20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostThreadMessageA
LoadStringA
GetMessageA
DispatchMessageA
kernel32
GetProcessHeap
FreeResource
HeapAlloc
WideCharToMultiByte
WriteFile
lstrlenA
GetStdHandle
GetModuleHandleA
lstrcatA
FormatMessageA
lstrcpyA
LocalAlloc
LocalFree
WaitForSingleObject
HeapReAlloc
lstrlenW
GetCommandLineW
GetCurrentThreadId
CreateThread
LockResource
LoadResource
SizeofResource
FindResourceA
GetLastError
ExitProcess
CloseHandle
ole32
CoGetClassObject
CoUninitialize
CoInitialize
oleaut32
SysStringLen
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ