Static task
static1
Behavioral task
behavioral1
Sample
67d1f9b05207dce052ede91530f44a3c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67d1f9b05207dce052ede91530f44a3c.exe
Resource
win10v2004-20231215-en
General
-
Target
67d1f9b05207dce052ede91530f44a3c
-
Size
19KB
-
MD5
67d1f9b05207dce052ede91530f44a3c
-
SHA1
09d44d3ca8d3fb8ace120a1e59155af5f50a8aa0
-
SHA256
874b671068ba122d0f677bc98a53f29d832417d383169a203183348e08bcaa79
-
SHA512
650e171c7dad464610cfadfd7764c8d71c10dce8c1408f41cc434eaa4c31e2de8be06d9017c8911a285d704da6eac63168e01cd6b61a4225f8bce21456c686d2
-
SSDEEP
384:dIwJ3gcHgvF9sDXkhHrJnQxGFhBryii7w:zJevPmMH1n0+hBr67w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67d1f9b05207dce052ede91530f44a3c
Files
-
67d1f9b05207dce052ede91530f44a3c.exe windows:4 windows x86 arch:x86
a12edea493d19aec20c912c86385e6e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
UpdateWindow
TranslateMessage
ShowWindow
SetMenu
RegisterClassExA
PostQuitMessage
PeekMessageA
LoadMenuA
LoadCursorA
GetSystemMetrics
GetMessageA
DispatchMessageA
CreateWindowExA
wsprintfA
kernel32
lstrlenA
lstrcpyA
lstrcmpA
lstrcatA
WriteFile
TerminateProcess
Sleep
CloseHandle
CopyFileA
CreateFileA
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
GetCurrentProcessId
GetFileAttributesA
GetModuleFileNameA
GetModuleHandleA
GetProcessHeap
GetSystemDirectoryA
GetSystemTime
GetTickCount
HeapAlloc
HeapReAlloc
OpenProcess
Process32First
Process32Next
ReadFile
SetCurrentDirectoryA
advapi32
RegCreateKeyA
RegSetValueExA
RegDeleteKeyA
RegCloseKey
crypt32
CryptBinaryToStringA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE