Static task
static1
Behavioral task
behavioral1
Sample
c1388a4461191457c59a939377b14108.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1388a4461191457c59a939377b14108.exe
Resource
win10v2004-20240226-en
General
-
Target
c1388a4461191457c59a939377b14108
-
Size
115KB
-
MD5
c1388a4461191457c59a939377b14108
-
SHA1
6c2e9d486b6983b3b8b140be5479839ef2ff3fa5
-
SHA256
9130909a84760819e455c50831171894d6b60e514f20ce1e4c93f865e9e0742c
-
SHA512
9d8108064ced596d208217713c951467c7ed415be2637e2c6ac16bfcdc0f31634039dab1569813a52b5e57e667a8a0b4364cf9ba6b61b281ad80ca7346a39b29
-
SSDEEP
1536:svnppfjzTAyDWvxOSmRsOeslpUXDKMj3WW1DZyX4TDI3xF8blSk:svnppfjzTAyDWJOSKswpCB7CSIuz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1388a4461191457c59a939377b14108
Files
-
c1388a4461191457c59a939377b14108.exe windows:4 windows x86 arch:x86
8b54a587227642ebb3f1a47cd2770d25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerFindFileA
shell32
SHGetFolderPathA
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
SHGetFileInfoA
SHFileOperationA
shlwapi
SHQueryValueExA
gdi32
GetCurrentPositionEx
RestoreDC
GetRgnBox
CreatePalette
CreateDIBitmap
GetBitmapBits
CreateCompatibleBitmap
kernel32
GetVersion
MoveFileExA
GlobalAlloc
ExitThread
CreateThread
FormatMessageA
GetCommandLineA
lstrlenA
SetThreadLocale
GetModuleHandleA
GetEnvironmentStrings
GetProcAddress
GetStartupInfoA
CompareStringA
HeapDestroy
LocalReAlloc
GetFileType
VirtualAllocEx
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE