Static task
static1
Behavioral task
behavioral1
Sample
89abf8016db59d52787912e894b90ec6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89abf8016db59d52787912e894b90ec6.exe
Resource
win10v2004-20231215-en
General
-
Target
89abf8016db59d52787912e894b90ec6
-
Size
34KB
-
MD5
89abf8016db59d52787912e894b90ec6
-
SHA1
d44c532af7e45796872aa0136d366a649d936af5
-
SHA256
eabaec4a4085e7f39125d7242b35632481db6b8d111ad381d844b03811fdac4f
-
SHA512
ff494adfbaf78a897b1ede1255e1250125d3f61b1338b2fa40b40818955af612b0fae0fcc8c629a371e06ce97c95c403e293cf974bfe5906557be8d77bf2f120
-
SSDEEP
384:pQziYNVMNeC0x2ziYNiNek+vDZ13sIMJd2RRvMuUURUnA/or/zo80xBu:+OUDx2OU510Jd2RtMuU8yA/S0u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89abf8016db59d52787912e894b90ec6
Files
-
89abf8016db59d52787912e894b90ec6.exe windows:4 windows x86 arch:x86
3a01c160c5740731d2233d66881a716c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetDiskFreeSpaceExW
IsBadCodePtr
CloseHandle
IsBadReadPtr
PulseEvent
GetDateFormatA
FindClose
GetLastError
Sleep
SetLastError
VirtualProtect
LoadLibraryExA
EnumResourceTypesA
TlsGetValue
GetCommandLineA
FreeConsole
DeleteCriticalSection
LocalFree
GetDriveTypeW
shell32
ShellMessageBoxA
DllUnregisterServer
DragQueryFileA
ShellAboutA
DragAcceptFiles
ExtractIconA
SHGetMalloc
SHGetSettings
DuplicateIcon
SHGetDiskFreeSpaceA
StrChrA
DragFinish
SHFree
msasn1
ASN1BERDecBool
ASN1BERDecEoid
ASN1BERDecDouble
ASN1BERDecCheck
ASN1BERDecFlush
advapi32
RegCloseKey
Sections
.text Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ