Static task
static1
Behavioral task
behavioral1
Sample
95cb327be6fff003bb679328b3e529ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95cb327be6fff003bb679328b3e529ce.exe
Resource
win10v2004-20231215-en
General
-
Target
95cb327be6fff003bb679328b3e529ce
-
Size
158KB
-
MD5
95cb327be6fff003bb679328b3e529ce
-
SHA1
84aabb4a7b536ae448356eb792353377581a5970
-
SHA256
3375c4b2ed1efd7de002dde9bbc7b4eb839d874da41bb95edb4fac2a8adb12a5
-
SHA512
e5f690a8437e18bf09e809cb146925edff4177017b2106d2f8256a4a1ba29da6a64fb5f5993540244f64e0ee458ca30a0021573c3670cfd441cda84467a4e8bc
-
SSDEEP
3072:QMgvHiP8W0QWIJIwHMYSQvMptbLMJZLiseXN+vOEVElhIjuDxgszJ6YMp1XVcwYl:QMEikJSsYnuKZenEalG+f9WDXVhxyoXU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95cb327be6fff003bb679328b3e529ce
Files
-
95cb327be6fff003bb679328b3e529ce.exe windows:5 windows x86 arch:x86
b565bcfb9b1f0df94412230aa77d7d07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
RegQueryInfoKeyA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
AdjustTokenPrivileges
RegSetValueExA
GetTokenInformation
RegCreateKeyExA
RegQueryValueExA
EqualSid
RegDeleteValueA
kernel32
LocalFree
SetFileAttributesA
CreateEventA
VirtualQuery
IsDBCSLeadByte
GetVolumeInformationA
MoveFileA
_lclose
LockResource
lstrcmpiA
GetCurrentThreadId
GetModuleFileNameA
IsDebuggerPresent
GetVersionExA
GetCurrentProcessId
FindResourceA
SetEvent
GetExitCodeProcess
LoadLibraryExA
GetShortPathNameA
FreeLibrary
RemoveDirectoryA
TerminateThread
TerminateProcess
SetUnhandledExceptionFilter
LockFileEx
lstrcpyA
FindClose
GetDriveTypeA
GetCurrentThreadId
_lopen
ResetEvent
GetSystemDirectoryA
CreateProcessA
lstrcatA
lstrcpynA
GetStartupInfoA
SetFilePointer
GlobalLock
GetTickCount
ExitProcess
FormatMessageA
FindFirstFileA
FreeResource
CreateThread
GetLastError
GetCurrentProcess
CreateFileA
GlobalAlloc
CloseHandle
SizeofResource
GetModuleHandleA
GetTempFileNameA
FindNextFileA
WriteFile
GetTempPathA
CreateDirectoryA
GlobalUnlock
LoadResource
GetFileAttributesA
SetFileTime
lstrcmpA
DeleteFileA
SetCurrentDirectoryA
_llseek
LocalAlloc
UnhandledExceptionFilter
GlobalFree
GetCommandLineA
GetProcAddress
MulDiv
GetCurrentDirectoryA
lstrlenA
CreateMutexA
GetSystemInfo
ReadFile
GetWindowsDirectoryA
GetDiskFreeSpaceA
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
gdi32
GetDeviceCaps
user32
EnableWindow
PeekMessageA
CallWindowProcA
LoadStringA
ShowWindow
GetDlgItemTextA
GetDesktopWindow
SendMessageA
GetDlgItem
ExitWindowsEx
DispatchMessageA
EndDialog
CharUpperA
wsprintfA
SetWindowTextA
MessageBoxA
SetWindowPos
SetWindowLongA
GetWindowRect
CharPrevA
GetWindowLongA
CharNextA
MessageBeep
SetDlgItemTextA
GetSystemMetrics
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.keqg Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 139KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ