Static task
static1
Behavioral task
behavioral1
Sample
67d1adcfabd9b9843d31cf1201a8093a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67d1adcfabd9b9843d31cf1201a8093a.exe
Resource
win10v2004-20231215-en
General
-
Target
67d1adcfabd9b9843d31cf1201a8093a
-
Size
130KB
-
MD5
67d1adcfabd9b9843d31cf1201a8093a
-
SHA1
354a5394000cda6fad745ad84e6a3f14a446ab54
-
SHA256
e528af03d4ecaf10803ac7b46317899cd6de65f12c61b32739f1f5c333c29e22
-
SHA512
df0448d01deb45a43cc089a0126bdd6fe259ae5e7753098c01c007388c8ca4044b18cf3f8153e989011c93822fb349acfff378972073e9116c3a91d3a9dad59b
-
SSDEEP
1536:VgpUMwrKzsi/tbtCjRxppeKqjg6jLVlwnuQT1YbK/XM0RaOmdQYxxztasFSJ:Vgp86sytu3ppeLjgELVaaK/XrRNuxx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67d1adcfabd9b9843d31cf1201a8093a
Files
-
67d1adcfabd9b9843d31cf1201a8093a.exe windows:4 windows x86 arch:x86
b6cb806f6ff53355733f3d8eb675298d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
CreateThread
GetLastError
VirtualProtect
GetTickCount
TlsGetValue
Sleep
SearchPathA
FindResourceExA
ExitProcess
ReleaseMutex
SetEvent
FindVolumeClose
CloseHandle
GetDiskFreeSpaceA
lstrlenA
DeleteCriticalSection
GetCalendarInfoA
FindClose
GetModuleHandleA
advapi32
AccessCheck
CloseEventLog
RegLoadKeyA
LsaSetSecret
GetFileSecurityA
RegEnumKeyExA
CloseTrace
LsaFreeMemory
RegCreateKeyExA
LsaClose
IsValidSid
OpenEventLogA
FreeSid
RegCloseKey
RegCloseKey
msdtcuiu
DllRegisterServer
DtcPerfCollect
DtcPerfOpen
DtcPerfClose
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE