Static task
static1
Behavioral task
behavioral1
Sample
67aae0d20f92096432b9a34f135cbfa2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67aae0d20f92096432b9a34f135cbfa2.exe
Resource
win10v2004-20231215-en
General
-
Target
67aae0d20f92096432b9a34f135cbfa2
-
Size
41KB
-
MD5
67aae0d20f92096432b9a34f135cbfa2
-
SHA1
fb174a82c8da1f87d3b0321cdec1054bdc96de35
-
SHA256
8c07d6b49db02fceb1d956becab3861b5c4475e78219f16cad50860356ba3881
-
SHA512
dbe8157543ffe76ab8b49277b3f12063c7736a54c6cd1062bfb1247670db233f8869a0d707d1c352f9e19d17c49f41ed9eeed005434ef92c3e880e7f4022a438
-
SSDEEP
768:GLRUBOC1llSdWSaqFmuk8SlzQuKGM4csBhcqdXf0fDkvnHfPzPlHXV3sF8qS:XBhfE390xFlkSv/GqdXf0fDkvnHfPzPd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67aae0d20f92096432b9a34f135cbfa2
Files
-
67aae0d20f92096432b9a34f135cbfa2.exe windows:4 windows x86 arch:x86
1726b440ccd93d04788f324b5700e060
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
InterlockedIncrement
UnregisterConsoleIME
lstrcpynW
GetLogicalDriveStringsA
GetCurrentProcess
FindFirstVolumeMountPointA
GetCurrencyFormatA
LocalFlags
LoadLibraryA
GetProcAddress
GetPrivateProfileSectionW
GetDriveTypeW
GetLastError
SwitchToThread
SetMailslotInfo
GetCalendarInfoW
GetSystemDefaultLCID
VirtualProtectEx
SetConsoleTextAttribute
GetOEMCP
CommConfigDialogW
RequestWakeupLatency
user32
SetCapture
Sections
.text Size: 4KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE