Static task
static1
Behavioral task
behavioral1
Sample
de3edf193321040cf25d0b5c0609a677.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de3edf193321040cf25d0b5c0609a677.exe
Resource
win10v2004-20240226-en
General
-
Target
de3edf193321040cf25d0b5c0609a677
-
Size
9KB
-
MD5
de3edf193321040cf25d0b5c0609a677
-
SHA1
cd4f8e392c15828651062ed5bd8658c76b090c18
-
SHA256
1cb850fc3b6a8f658b6dd43d7a22f80c8afecc0bbeafb85013e5ff060c547eae
-
SHA512
7c8e050c0223449e28fe3b1910e458e27761102409ffcc6774fbdfccd4462e11422c2ce991ef53fda5698bd01320d464a7d478ed864b285c10e48fbe40c213f8
-
SSDEEP
192:qiW7RIwsGm8+n/ygJQuui4iIA/6oqcB67lR:qiWdn4n/yg+itIkH67l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de3edf193321040cf25d0b5c0609a677
Files
-
de3edf193321040cf25d0b5c0609a677.exe windows:4 windows x86 arch:x86
7e04a6da7ed54750de120428ffd3df91
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
lstrcatA
CopyFileA
GetSystemDirectoryA
lstrcpyA
CreateThread
GetDriveTypeA
CreateDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
GetPrivateProfileStringA
lstrlenA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE