Static task
static1
Behavioral task
behavioral1
Sample
c81aa1f83960c6fc8ab4a92317458a7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c81aa1f83960c6fc8ab4a92317458a7c.exe
Resource
win10v2004-20240226-en
General
-
Target
c81aa1f83960c6fc8ab4a92317458a7c
-
Size
19KB
-
MD5
c81aa1f83960c6fc8ab4a92317458a7c
-
SHA1
abcffbedd0f77135a7e270c6bd012160fc5d33ac
-
SHA256
37df0e98cbfc3c5aaa9f501acf2851a56b6b923f92988c5bb2c3a7655729781a
-
SHA512
3c6b4c66ed1865652833b86f8f4c90be16a8b7dd31ce04b10000cc6c7967b2e7e2aa491f3bb271da435bfa6c44bce3c15fd1bbf0f0c5c964b080a91af10debd3
-
SSDEEP
384:qK+pGLd/GYeBUXiRj/42Hxadm4eh/3UtOTw6jK32VqxctsEOIemulnfWjvOeo:qKjZ/6BeiRj/4QxakF9I2sxctNNejln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c81aa1f83960c6fc8ab4a92317458a7c
Files
-
c81aa1f83960c6fc8ab4a92317458a7c.exe windows:4 windows x86 arch:x86
52691cf99b428b33a3d9731ba9a81899
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetTempPathA
lstrcpyA
CloseHandle
lstrcatA
WaitForSingleObject
CreateEventA
GetProcessHeap
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
LoadLibraryA
GetModuleHandleA
ExitProcess
WriteFile
GetProcAddress
CreateThread
SetEvent
ExitThread
GetVersionExA
RtlUnwind
user32
wsprintfA
DispatchMessageA
SetThreadDesktop
ShowWindow
PeekMessageA
TranslateMessage
CreateDesktopA
MsgWaitForMultipleObjects
DestroyWindow
CharToOemA
IsWindow
GetTopWindow
CreateWindowExA
advapi32
RegCreateKeyExA
RegCloseKey
shell32
SHGetFolderPathA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ