Static task
static1
Behavioral task
behavioral1
Sample
593ea329b9bcef61a546ca53e10303e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
593ea329b9bcef61a546ca53e10303e7.exe
Resource
win10v2004-20231215-en
General
-
Target
593ea329b9bcef61a546ca53e10303e7
-
Size
51KB
-
MD5
593ea329b9bcef61a546ca53e10303e7
-
SHA1
2c38dae9764ae89552dae3019d57b5e83589e563
-
SHA256
36de884c8c24ffab95e6a09daed5a03be99692ff20160ba22daa4628a0cc339b
-
SHA512
8b72b99fcd1ab3b3758777e3f1b772d52c57845fc1cb1895bea6af3f3c1371fba6aede866e8cd20ea7795147b635b6efc5674ebf45bb3ebe1a684bc5c9c64a54
-
SSDEEP
768:vXCWMfhITnQaI6+BdxxJM6JjCxP+FNYIKPFOMj22el3I:fCvfhIu6+dxJ9jRPKPXh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 593ea329b9bcef61a546ca53e10303e7
Files
-
593ea329b9bcef61a546ca53e10303e7.exe windows:4 windows x86 arch:x86
c9268a83fd14fa04a25c08f6986d6a3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetModuleFileNameA
GetSystemDirectoryA
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetWindowsDirectoryA
CreateProcessA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalFree
GetModuleHandleA
WriteFile
GlobalAlloc
user32
ShowWindow
GetDlgItem
EnableWindow
SetWindowTextA
EndDialog
LoadIconA
GetDesktopWindow
SendMessageA
GetDlgItemTextA
SetClassLongA
SendDlgItemMessageA
SetDlgItemTextA
CharPrevA
MessageBoxA
wsprintfA
DialogBoxParamA
gdi32
DeleteObject
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ