Static task
static1
Behavioral task
behavioral1
Sample
85c1ef29e16b053f2fb070056ebe990f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85c1ef29e16b053f2fb070056ebe990f.exe
Resource
win10v2004-20231215-en
General
-
Target
85c1ef29e16b053f2fb070056ebe990f
-
Size
133KB
-
MD5
85c1ef29e16b053f2fb070056ebe990f
-
SHA1
08059f4defe782f059cfad3bb0e20935410fef46
-
SHA256
56b68a8c2b1c7592905c29995336236b06647c9581816b933b56a6e3b61c9dea
-
SHA512
ae44b253560bd15bd4ed5cb734366bda09beac8576222ac700fb1d08d6d5b72a5f1fb63a7ef246e00242b7b368a842299b5c101e73f352214dea605e80e64bce
-
SSDEEP
3072:+uWaCSfWuuaI0Gej4PvwWzI1Zgs+sbB2RKWwcsRS5/:p7bj4PIWzKZgs+QBAK9csRSZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85c1ef29e16b053f2fb070056ebe990f
Files
-
85c1ef29e16b053f2fb070056ebe990f.exe windows:4 windows x86 arch:x86
b8f51e2626166e3ca27ff3e48b84072d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
GetExitCodeProcess
CreateFileW
lstrcpyA
CloseHandle
CreateMutexA
GetEnvironmentVariableA
UnmapViewOfFile
SetLastError
GetCurrentThreadId
ReleaseMutex
GlobalUnlock
GetModuleHandleA
LoadLibraryExA
GetStdHandle
HeapCreate
GlobalFree
FindResourceW
lstrlenW
GetProcessHeap
user32
GetCaretPos
GetDC
DrawEdge
CreateMenu
FillRect
CheckRadioButton
IsWindow
CallWindowProcA
GetDlgItem
CreateWindowExA
DrawMenuBar
DispatchMessageA
SetFocus
rsaenh
CPGenKey
CPDecrypt
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE