Static task
static1
Behavioral task
behavioral1
Sample
ef8a0fafa13e2133981d74dd31c92a7a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ef8a0fafa13e2133981d74dd31c92a7a.exe
Resource
win10v2004-20231215-en
General
-
Target
ef8a0fafa13e2133981d74dd31c92a7a.exe
-
Size
392KB
-
MD5
ef8a0fafa13e2133981d74dd31c92a7a
-
SHA1
e23d4668cd6684c0c0e4a35013411eada9586bbc
-
SHA256
71c828bc19b25a3800deedb6a442d5f9a8fc626217cbf6c079d6fa2074fa7230
-
SHA512
4405ea90c0ad356bd2bdfbf9e016ea98f1d5c706d35ac0d5b20676a86831b694e4369e6b631cc4e7fcf459cf66f96cfc3d5875ccd3d5f6a5d4bf4f338636b3eb
-
SSDEEP
6144:H1x1wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH4DPq:r/ApUvsfRh+ajZCBAMXoUK0VHMq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef8a0fafa13e2133981d74dd31c92a7a.exe
Files
-
ef8a0fafa13e2133981d74dd31c92a7a.exe.exe windows:4 windows x86 arch:x86
ef55f4e6e5a927bf7e495ea0aa15ef9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
HeapCreate
GetModuleHandleA
GlobalFree
LoadLibraryExW
TlsGetValue
CreateMutexA
CreateFileA
GetACP
GetEnvironmentVariableA
GetProcessHeap
FindClose
ExitThread
SetConsoleCursorInfo
UnmapViewOfFile
ReleaseMutex
SetLastError
GetLastError
HeapDestroy
FindResourceA
user32
CallWindowProcA
GetFocus
CopyRect
DefWindowProcW
GetIconInfo
FillRect
GetDC
DrawMenuBar
CheckRadioButton
DrawEdge
DispatchMessageA
IsWindow
GetDlgItem
uxtheme
GetThemeRect
DrawThemeText
DrawThemeIcon
GetThemeSysInt
DrawThemeEdge
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ