Static task
static1
Behavioral task
behavioral1
Sample
a415da822b4a01e5357b8effed9dcc17.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a415da822b4a01e5357b8effed9dcc17.exe
Resource
win10v2004-20240221-en
General
-
Target
a415da822b4a01e5357b8effed9dcc17
-
Size
43KB
-
MD5
a415da822b4a01e5357b8effed9dcc17
-
SHA1
3dac0bb22b0ab906c1311d41cfed9812692b726b
-
SHA256
874d70158da8ef36726cc41ef7d8aed8a29dcd67e6de9a08a5b5f57abb387a86
-
SHA512
a35af70b277f5b71b522a228c25dec938300a8fcc863e184e8fb53eee253725a048c09ac3b71eddbfdbc014ef00700461de69441fcf6a70fc27cb47698afdf35
-
SSDEEP
768:3LozGHM5cVHO/GQsUCxq4bZ4VOO6jHIbt5CGrbbo9Y9a+DJX6oW7cOAxBwMO71i:3+E3QQjF4VOOUHYZ09xIqMO71
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a415da822b4a01e5357b8effed9dcc17
Files
-
a415da822b4a01e5357b8effed9dcc17.exe windows:5 windows x86 arch:x86
3c707462b7dbf5718168f492ad9192b2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GetModuleFileNameA
GetSystemTime
SetEndOfFile
UnmapViewOfFile
GlobalLock
CreateProcessW
GetTempPathW
FindFirstFileW
FlushFileBuffers
lstrlenA
ExpandEnvironmentStringsW
CreateEventW
GetSystemTimeAsFileTime
HeapAlloc
SetFileTime
FindClose
SetThreadPriority
lstrcmpiA
GetCurrentThread
lstrcatW
CloseHandle
DisconnectNamedPipe
SetLastError
GetDriveTypeW
GetTimeZoneInformation
CopyFileW
MoveFileExW
EnterCriticalSection
HeapFree
user32
GetKeyState
Sections
.qbelol Size: 35KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jqz Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jidkd Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ