Static task
static1
Behavioral task
behavioral1
Sample
Malicious_25c424f82dd42aab060068b2919577be3a88bf06ac9e23c077ee27da70477142.exe
Resource
win7-20230621-en
General
-
Target
Malicious_25c424f82dd42aab060068b2919577be3a88bf06ac9e23c077ee27da70477142.exe
-
Size
94KB
-
MD5
fcfb1db3db4c9d196192b30ce2790e96
-
SHA1
8215af24148a87cb649739d478b770f38998373d
-
SHA256
25c424f82dd42aab060068b2919577be3a88bf06ac9e23c077ee27da70477142
-
SHA512
64077b77da3262e3f65aad2eb2ed6fd91f7a0cd90e843f37918c715a66a4c0455a59661499ee1c24bfa40021e5e17ec15edf56547e3dbb7258b83ab1bddc2357
-
SSDEEP
1536:pEVLM9jvEOD5vctJiw/BLJjTAjibLLRwr0OfEiZx2Z0UXn7IV:pEV8V5cqOLJgjMLdY0OfEii0UXnkV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_25c424f82dd42aab060068b2919577be3a88bf06ac9e23c077ee27da70477142.exe
Files
-
Malicious_25c424f82dd42aab060068b2919577be3a88bf06ac9e23c077ee27da70477142.exe.exe windows x64
27516fd8750f40bdecf52a1420a0296a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
strlen
malloc
memset
getenv
sprintf
printf
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
kernel32
Sleep
GetModuleFileNameA
CreateProcessA
CloseHandle
SetUnhandledExceptionFilter
ntdll
NtAllocateVirtualMemory
NtWriteVirtualMemory
NtCreateThreadEx
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ