Static task
static1
Behavioral task
behavioral1
Sample
656589d04c12b82e93f74b6cfbc0d943.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
656589d04c12b82e93f74b6cfbc0d943.exe
Resource
win10v2004-20231215-en
General
-
Target
656589d04c12b82e93f74b6cfbc0d943
-
Size
365KB
-
MD5
656589d04c12b82e93f74b6cfbc0d943
-
SHA1
caf0214c01c877f50fa62427c47bbb2cd0a84532
-
SHA256
19ebbb3b4bb57beecad845cba7eae66f3cc7b63e1cd6de840c712531b86f86a1
-
SHA512
04984c7eb5132c806824660f09ec3da1d689d1423e665118d471c6f81fc1a31788ca3b4a9197e4f5ba2e8ed00d39c51f18e057795492159b4cfe6b8175a7e5f4
-
SSDEEP
6144:sFdvx0NXgEJL8kTvI/qFUmZQab7T5kaRJMggJEEVlRbkSD+WyWIaNmp:sFdvC+EJVTU5OQdaRag4ESluSDj3q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 656589d04c12b82e93f74b6cfbc0d943
Files
-
656589d04c12b82e93f74b6cfbc0d943.exe windows:4 windows x86 arch:x86
aa63b8ab21d59ad44a49bf9a7950e3ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
EnumResourceTypesA
LoadLibraryExW
GetModuleHandleA
SetLastError
GetLastError
GetTickCount
GetComputerNameA
CloseHandle
VirtualProtect
Sleep
ReleaseMutex
FreeConsole
TlsGetValue
GetDiskFreeSpaceExW
GetExitCodeProcess
GetDriveTypeA
FindClose
DeleteCriticalSection
GetCommandLineA
shell32
DllGetVersion
DragQueryFileA
DragAcceptFiles
SHFree
ShellAboutA
SHGetNewLinkInfo
ShellMessageBoxA
SHGetDiskFreeSpaceA
DragFinish
StrChrA
SHGetSettings
SheChangeDirA
SHGetMalloc
glmf32
glsChannel
glsBinary
glsBlock
glsComment
glsAppRef
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ