Static task
static1
Behavioral task
behavioral1
Sample
Malicious_73ef1e1b86a5df5ed8fdef61ed5bca20894a87bc15c115b4646d93f24b4c091b.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_73ef1e1b86a5df5ed8fdef61ed5bca20894a87bc15c115b4646d93f24b4c091b.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_73ef1e1b86a5df5ed8fdef61ed5bca20894a87bc15c115b4646d93f24b4c091b.exe
-
Size
95KB
-
MD5
b1ec8e77c1098e5cf47f215a5f1f4492
-
SHA1
0acd79315de6d00c90046e285fb7301296dfd3fc
-
SHA256
73ef1e1b86a5df5ed8fdef61ed5bca20894a87bc15c115b4646d93f24b4c091b
-
SHA512
12589cd6fac2fcf36fbafe8320eba864c5b26da2048929205ed9e19b7eecbddfbe36e7118c7b078f6c80dd06771a6e2d581ef3a13778582f551802a31520ba09
-
SSDEEP
1536:UILuysUuWrI9JNQJU+yqFPP3lLuBZHWsSTN5AWsSTN5ywuYQvsQ0qG+VCW7:rqquWEWUUZ3lPsSTbsST2YQv2MD7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_73ef1e1b86a5df5ed8fdef61ed5bca20894a87bc15c115b4646d93f24b4c091b.exe
Files
-
Malicious_73ef1e1b86a5df5ed8fdef61ed5bca20894a87bc15c115b4646d93f24b4c091b.exe.exe windows x86
6e4cac6a688fffdc42fa065481470bfd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateProcessA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetEnvironmentStringsA
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenProcess
SetFileAttributesA
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
_strdup
_stricoll
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_fpreset
_fullpath
_iob
_isctype
_onexit
_pctype
_setmode
_stricmp
abort
atexit
atoi
calloc
exit
fputc
free
fwrite
getenv
localeconv
malloc
mbstowcs
memcpy
memset
rand
realloc
setlocale
signal
sprintf
srand
strchr
strcmp
strcoll
strlen
time
tolower
vfprintf
wcslen
wcstombs
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/91 Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ