Static task
static1
Behavioral task
behavioral1
Sample
67b16b0cee82237caf7803ef1c931010.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67b16b0cee82237caf7803ef1c931010.exe
Resource
win10v2004-20231222-en
General
-
Target
67b16b0cee82237caf7803ef1c931010
-
Size
88KB
-
MD5
67b16b0cee82237caf7803ef1c931010
-
SHA1
401d77122fa80d8986fd39749a1d08f4d3d7a559
-
SHA256
a2ac5105783b39d0ce0e02f365767066388c440a53dc2dae31de9b7084628315
-
SHA512
39c546223b12ffd7ab7667ad9fbadf111522d1ca916d3f9d7075cd1b3d8aaf9bdd0e70684e3b6a5a4e18cf70851ecaece96e7f47f35456581db0cb5f68fde961
-
SSDEEP
768:VEH1WtzHPEa/XsCB/ULAb8NtaDo/cGvFaONhtDuYeFTNvGNK/xE/JwZNUpf3r8ii:VRP1X0kbItaqvF0TeZ/JOSpN0E4/E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67b16b0cee82237caf7803ef1c931010
Files
-
67b16b0cee82237caf7803ef1c931010.exe windows:4 windows x86 arch:x86
f51dbb5d58f91b4e23e61526f299db35
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetDlgItemTextA
SendMessageA
SendDlgItemMessageA
MessageBoxA
GetDlgItemTextA
GetDlgItem
EndDialog
DialogBoxParamA
kernel32
WriteFile
FlushFileBuffers
ReadFile
GlobalAlloc
GetFileSize
CreateFileA
CloseHandle
CreateProcessA
DeleteFileA
ExitProcess
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempFileNameA
GetTempPathA
GetThreadContext
GetTickCount
GlobalFree
LoadLibraryA
ReadProcessMemory
ResumeThread
RtlZeroMemory
SetThreadContext
Sleep
SuspendThread
VirtualAlloc
WriteProcessMemory
lstrcatA
lstrlenA
GetModuleFileNameA
comdlg32
GetOpenFileNameA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE