Static task
static1
Behavioral task
behavioral1
Sample
329a6ed6e8359a15d11e88b722b01164.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
329a6ed6e8359a15d11e88b722b01164.exe
Resource
win10v2004-20240226-en
General
-
Target
329a6ed6e8359a15d11e88b722b01164
-
Size
41KB
-
MD5
329a6ed6e8359a15d11e88b722b01164
-
SHA1
4313712c35449000fc0c137f7a34ef661f9afb65
-
SHA256
bcdd2a922ee15ffc1acbb0de6e5d0871fd47f19e54f8e50f22605c697cca2930
-
SHA512
af2c1db3d98cdda0c59187820f220194f3e3256d079c35581edb8f31fb3cf6e4c3b1b19419f6f2f827a10b8ad2d534e7d24f66de5d9b418b55a6f54c278b97f2
-
SSDEEP
384:cRvJdqOxpqm5LpvmLwtCO/e0Ajj6AH2XWwBOdw65UBsU0BSfcCoIVvuy:ghUK3dIgCSJAvLiBOdP2Bd0Bccsv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 329a6ed6e8359a15d11e88b722b01164
Files
-
329a6ed6e8359a15d11e88b722b01164.exe windows:4 windows x86 arch:x86
e1894de59266b62f743d38ca0eda457b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
SendMessageW
DestroyWindow
DefWindowProcW
CreateWindowExW
LoadCursorW
LoadIconW
RegisterClassExW
LoadAcceleratorsW
GetMessageW
TranslateMessage
DispatchMessageW
kernel32
lstrcpynW
lstrcatW
GetCommandLineW
LoadLibraryW
GetTempPathW
ReadFile
CreateFileW
GetTickCount
GetModuleHandleA
GetProcessHeap
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetModuleHandleW
ExitProcess
gdi32
TextOutW
SetTextAlign
SetBkColor
DeleteObject
GetBkColor
GetStockObject
CreateSolidBrush
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ