Static task
static1
Behavioral task
behavioral1
Sample
a9a25e421e60d165c8aff82e1a8d6d67.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a9a25e421e60d165c8aff82e1a8d6d67.exe
Resource
win10v2004-20240226-en
General
-
Target
a9a25e421e60d165c8aff82e1a8d6d67
-
Size
65KB
-
MD5
a9a25e421e60d165c8aff82e1a8d6d67
-
SHA1
6f71e40003aa02a712ac5f889a00c9fe6779fe09
-
SHA256
68aba42f4552645c85acd2b48fa5d6273d5a143a5316ca3bea1012e8a83eb069
-
SHA512
af2156843600e7a3d7703ab73036306961a07de6ca1394c0c022c9919fdea74770ebab01828f472e43e0350692a5ea3a12b05a0e6a38da5d3a43e3e8ab80dad7
-
SSDEEP
1536:BUuejfBj8VgcKsAnuW6geKuwPm4Pk1yIygOdS:BqfiKcKsAnuWxqwm4gTfOdS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9a25e421e60d165c8aff82e1a8d6d67
Files
-
a9a25e421e60d165c8aff82e1a8d6d67.exe windows:4 windows x86 arch:x86
30484ba80e636a1e6fa228edc548cf49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetProcessHeap
GlobalUnlock
LoadLibraryExA
GetEnvironmentVariableA
GlobalFree
CreateFileA
TlsGetValue
FindResourceA
HeapCreate
lstrlenW
CloseHandle
TlsAlloc
DeleteAtom
SetLastError
CreateMutexA
GetExitCodeProcess
GetModuleHandleA
GetStdHandle
ReleaseMutex
user32
CallWindowProcA
FillRect
DrawMenuBar
SetFocus
CreateWindowExA
IsWindow
GetDC
GetDlgItem
CreateMenu
CheckRadioButton
GetCaretPos
DispatchMessageA
DrawEdge
rsaenh
CPDecrypt
CPGenKey
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE