Static task
static1
Behavioral task
behavioral1
Sample
12d87a4ee9fd360b494d2d7ea504e7b1e9e58250bf0a77e46c0a00d4d9d5493c.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
12d87a4ee9fd360b494d2d7ea504e7b1e9e58250bf0a77e46c0a00d4d9d5493c.exe
Resource
win10v2004-20231023-en
General
-
Target
12d87a4ee9fd360b494d2d7ea504e7b1e9e58250bf0a77e46c0a00d4d9d5493c
-
Size
19KB
-
MD5
6d8606463804cfe7b97e2e6d49696e9f
-
SHA1
8b98dedb14eee2802f86dd4a6a09d3f01b9b1bde
-
SHA256
12d87a4ee9fd360b494d2d7ea504e7b1e9e58250bf0a77e46c0a00d4d9d5493c
-
SHA512
33d6e714914d7bb426f8f143328532aaf0d31dd2c2609d749a94f9a9785069f09cade69fc8b0563e9ae25ef9ecec18ecc1eef15b1599debbc43558bb49355e04
-
SSDEEP
192:3x4fHBiJnA/1gWiViglqBZl5CyQCMcVLsEMoHS8hXh1QPhSjyCRuDgOxD8cHRDwW:3+fke1XBZl5tF6AWCyCRSrD8cytU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12d87a4ee9fd360b494d2d7ea504e7b1e9e58250bf0a77e46c0a00d4d9d5493c
Files
-
12d87a4ee9fd360b494d2d7ea504e7b1e9e58250bf0a77e46c0a00d4d9d5493c.exe windows:4 windows x86
Password: infected
72c455f33fb2105066d531d03af09eee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetConsoleWindow
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetNativeSystemInfo
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetThreadLocale
GetTickCount
HeapAlloc
HeapFree
InitializeCriticalSection
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
lstrlenA
msvcrt
__getmainargs
__initenv
__lconv_init
__p__acmdln
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_initterm
_iob
_onexit
_wcsnicmp
abort
bsearch
calloc
exit
fprintf
free
fwrite
malloc
mbstowcs
memcpy
memset
qsort
realloc
signal
strcmp
strlen
strncmp
strtol
vfprintf
wcstombs
user32
ShowWindow
winhttp
WinHttpCloseHandle
WinHttpConnect
WinHttpOpen
WinHttpOpenRequest
WinHttpQueryHeaders
WinHttpReadData
WinHttpReceiveResponse
WinHttpSendRequest
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1004B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE