Static task
static1
Behavioral task
behavioral1
Sample
95e326aaedfe106d3010804942b28b47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95e326aaedfe106d3010804942b28b47.exe
Resource
win10v2004-20231215-en
General
-
Target
95e326aaedfe106d3010804942b28b47
-
Size
27KB
-
MD5
95e326aaedfe106d3010804942b28b47
-
SHA1
ce8a6254f7c94ef5cfe06bd87d4bbee35ecf12d7
-
SHA256
41be98da9235d33d12b6489159870faf055fc14036250b4fb756059bbce98452
-
SHA512
c5d0ac44152c442423a7c44338e648a458d396d48c61e8db59ebf12591a12da14114e85c6563a3505718c264a037a8435908a02551a4059453d4dc6c840adbe8
-
SSDEEP
384:fcdOhVf9J9NST78m3B+SCRjufwB8/HjFTjSAD:fcErbun81SCVuJ/DD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95e326aaedfe106d3010804942b28b47
Files
-
95e326aaedfe106d3010804942b28b47.exe windows:4 windows x86 arch:x86
744b0f4715420f3c98b04fa9c853621c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
FindResourceW
GetComputerNameA
LoadLibraryExW
lstrcpyA
CloseHandle
lstrlenA
CreateProcessA
GetModuleHandleA
SetLastError
PulseEvent
FindClose
GetCurrentThreadId
GetCurrentDirectoryA
CreateFileW
HeapCreate
Sleep
LocalFree
GetCommandLineA
UnmapViewOfFile
user32
GetCaretPos
DispatchMessageA
DrawMenuBar
CallWindowProcA
GetDlgItem
CreateWindowExA
CreateIcon
GetDC
IsWindow
CheckRadioButton
SetFocus
FillRect
DrawEdge
rsaenh
CPSignHash
CPGenKey
CPDecrypt
CPDeriveKey
CPHashData
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE