Static task
static1
Behavioral task
behavioral1
Sample
0ef2a469b1aa37fbad051aa7bbddb250e0fb21a4744df3bdf27f58ac62720ae9.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0ef2a469b1aa37fbad051aa7bbddb250e0fb21a4744df3bdf27f58ac62720ae9.exe
Resource
win10v2004-20240508-en
General
-
Target
0ef2a469b1aa37fbad051aa7bbddb250e0fb21a4744df3bdf27f58ac62720ae9
-
Size
40KB
-
MD5
32baf7417a354e0d98c40eabc3da493f
-
SHA1
7fbfb685991499888092047620b1faacfe658860
-
SHA256
0ef2a469b1aa37fbad051aa7bbddb250e0fb21a4744df3bdf27f58ac62720ae9
-
SHA512
3367917ae4ae1588aba02f1e9fcdb4b65cc486ebd4a94434daebd7f2990ba06c4a18a19cf4cbed869c9b4cfea994cfa0bb47eb886ef6eb72a90ed72ba06353c7
-
SSDEEP
768:PT2t0cp04cpAwKz8jp35fCzCMMpxLe5csNzxSEG38kY:PTYtp04xcppTzijxS38j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ef2a469b1aa37fbad051aa7bbddb250e0fb21a4744df3bdf27f58ac62720ae9
Files
-
0ef2a469b1aa37fbad051aa7bbddb250e0fb21a4744df3bdf27f58ac62720ae9.exe windows:4 windows x86 arch:x86
ebb5fea1a6448dbfbb1b73c1dd99b3d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
DialogBoxParamA
DestroyWindow
DefWindowProcA
EndDialog
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
PostQuitMessage
RegisterClassExA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
kernel32
GetLogicalDriveStringsA
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
CreateFileA
GetModuleHandleA
FindFirstFileA
FindClose
GetFileSize
FindNextFileA
CloseHandle
GetFileType
GetModuleFileNameA
GetProcessHeap
DeleteFileA
GetEnvironmentStringsA
shfolder
SHGetFolderPathA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ