Static task
static1
Behavioral task
behavioral1
Sample
56941f7376833a9980af8c1746272b25.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56941f7376833a9980af8c1746272b25.exe
Resource
win10v2004-20231222-en
General
-
Target
56941f7376833a9980af8c1746272b25
-
Size
18KB
-
MD5
56941f7376833a9980af8c1746272b25
-
SHA1
0696fad09c093c9d02c3478618b31a6da1766750
-
SHA256
cf204761a3379bb3d5b4c1286299b432a0e719d04317e2922bbdb0fe2acd4ffb
-
SHA512
a0abe3ddcb91c9ffef6c9b05704e8c549fa741900a519da78aa51d7a19e733506b330c8712b99c8e9362bd20f5b75fc85576668b1be9100f89fa0cb638950d7c
-
SSDEEP
384:zEcsP6mDKt03c5tT32dsg3As0KQul0szto:wcsP6TtL8Hl0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56941f7376833a9980af8c1746272b25
Files
-
56941f7376833a9980af8c1746272b25.exe windows:4 windows x86 arch:x86
24819dcc8b96d08d1c2d6d09d47b15d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
GetFileAttributesA
lstrcatA
GetProcAddress
SetEvent
GetModuleFileNameA
GetModuleHandleA
CloseHandle
lstrcpyA
lstrlenA
SetFilePointer
LoadLibraryA
RtlUnwind
ExitProcess
CreateThread
WaitForSingleObject
GetVersionExA
WriteFile
ExitThread
GetTempPathA
CreateFileA
user32
wsprintfA
DestroyWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
ShowWindow
CreateWindowExA
SetThreadDesktop
CreateDesktopA
CharToOemA
BeginPaint
IsWindow
CloseWindow
Sections
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ