Static task
static1
Behavioral task
behavioral1
Sample
527f66df0a0ce8f135af7480cfbb483f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
527f66df0a0ce8f135af7480cfbb483f.exe
Resource
win10v2004-20231215-en
General
-
Target
527f66df0a0ce8f135af7480cfbb483f
-
Size
904KB
-
MD5
527f66df0a0ce8f135af7480cfbb483f
-
SHA1
227876c9f5838e63c0b1336cb9f79a932057a075
-
SHA256
e3bfeff004c247e35fe65b00781450656b0892b1eed9649a57b24e411a87d125
-
SHA512
0b83d44cb994577e8e9b8f847a0fdf380bf7be8043dd7307fbcc9a857815e7d1d3ebbc9dfe84fa6881e38cffe19ac1ec5778e8f99b7051276e473a7fa89a56a4
-
SSDEEP
24576:39nO4ygKQ2QtabDL+3m+pOUwbPbd7YMWBl3jd:39nOr1umeO19krlzd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 527f66df0a0ce8f135af7480cfbb483f
Files
-
527f66df0a0ce8f135af7480cfbb483f.exe windows:4 windows x86 arch:x86
a3458061802c54e63910f66bbe7a0181
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetFileAttributesA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
InitializeCriticalSectionAndSpinCount
CreateThread
CreateFileA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryA
GetLastError
GetProcAddress
LoadLibraryA
Sleep
FormatMessageA
SetFilePointer
ReadFile
WriteFile
WaitForSingleObject
LeaveCriticalSection
RemoveDirectoryA
DeleteFileA
MoveFileExA
ExitProcess
TerminateProcess
SetEvent
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
GetCurrentProcess
GetSystemDirectoryA
GetDriveTypeA
QueryDosDeviceA
GetDiskFreeSpaceA
GetSystemTime
SystemTimeToFileTime
GetCurrentDirectoryA
CreateProcessA
DeleteCriticalSection
GetExitCodeProcess
CloseHandle
HeapAlloc
HeapFree
EnterCriticalSection
user32
SetParent
ShowWindow
EndDialog
SendDlgItemMessageA
LoadStringA
MessageBoxA
SendMessageA
DialogBoxParamA
comctl32
ord17
advapi32
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
GetLengthSid
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetTokenInformation
OpenProcessToken
AllocateAndInitializeSid
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ntdll
strstr
_strlwr
strncpy
_allmul
sprintf
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124.9MB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ