Static task
static1
Behavioral task
behavioral1
Sample
648eae4d7a529aac777175b2fb82e0c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
648eae4d7a529aac777175b2fb82e0c5.exe
Resource
win10v2004-20231215-en
General
-
Target
648eae4d7a529aac777175b2fb82e0c5
-
Size
143KB
-
MD5
648eae4d7a529aac777175b2fb82e0c5
-
SHA1
d5ef858ddd5c83d5b4e5d373c6b1929dbe1ed85b
-
SHA256
faa7da3341facd3812af749df7d1018fc9cbe41d6b22a9534ad427c70a9c477a
-
SHA512
98892d16b8c36a59e02858fbbe7e614f634a280e10c5e63d287e0b3957f8c8217d26d008c02c0001c70c59f1a94a13a3ca5090113d0fa4808300b0b3cb698848
-
SSDEEP
3072:U4z/O/M9KWKzCxwBlA5I5VcwSWIJA9XbeNqPXX:1zW/KFKexXI7tRrn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 648eae4d7a529aac777175b2fb82e0c5
Files
-
648eae4d7a529aac777175b2fb82e0c5.exe windows:4 windows x86 arch:x86
2466f72df61f40db2ed3d0c0b780c7e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
GetLastError
CloseHandle
WaitForSingleObject
CreateProcessA
CreateDirectoryA
GetModuleFileNameA
GetVersionExA
LoadLibraryA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
GetTempPathA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
HeapAlloc
HeapFree
GetFileType
CreateFileA
ReadFile
WriteFile
SetFilePointer
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetEndOfFile
SetHandleCount
GetStdHandle
SetStdHandle
TerminateProcess
user32
IsDialogMessageA
TranslateMessage
DispatchMessageA
CreateDialogParamA
GetDlgItem
SetDlgItemTextA
MessageBoxA
SendMessageA
DestroyWindow
PeekMessageA
shell32
SHFileOperationA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ