Static task
static1
Behavioral task
behavioral1
Sample
c868bdc345747518a640f2880e2f4d69.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c868bdc345747518a640f2880e2f4d69.exe
Resource
win10v2004-20240226-en
General
-
Target
c868bdc345747518a640f2880e2f4d69
-
Size
752KB
-
MD5
c868bdc345747518a640f2880e2f4d69
-
SHA1
87355907e1c42b934f88c9e617887492acef10a2
-
SHA256
42e1283b7eb556ff5d0bd89c9114d9df2056e2b091de96c3869efbfb8407371e
-
SHA512
d29d7204efda66658da736443fe3464f88f9fdf225cc3f12390a7136426465a08a42a51cd5b6fb368f3f98e25c2632269f4af29ee1f79bf3974178feb8a4c027
-
SSDEEP
12288:MjBoDN0+vD/DEoxtG8n27wpgyX4Dbsx/qfbjH1f/wJQFhjsJ2ki/YdTb824fw5GL:MjiN0I/bxz1D4DbsyfHQJ2kdTkfwML
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c868bdc345747518a640f2880e2f4d69
Files
-
c868bdc345747518a640f2880e2f4d69.exe windows:4 windows x86 arch:x86
64b13f89243c759b59ea4e18a1690181
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
CloseHandle
GetModuleHandleA
HeapCreate
FindClose
SuspendThread
ExitProcess
ReleaseMutex
GetEnvironmentVariableW
CloseHandle
OpenEventW
GetVersion
WriteConsoleA
GetStartupInfoA
lstrlenW
HeapDestroy
CreateSemaphoreW
DeleteFileA
SetEvent
FindResourceExA
user32
GetClassInfoA
FindWindowA
SetFocus
DispatchMessageA
GetWindowLongA
GetSysColor
CallWindowProcW
DrawTextW
PeekMessageA
IsZoomed
DispatchMessageA
GetKeyState
CreateIcon
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ