Static task
static1
Behavioral task
behavioral1
Sample
e34ff25373c3cb3d24aea70273942b73.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e34ff25373c3cb3d24aea70273942b73.exe
Resource
win10v2004-20231222-en
General
-
Target
e34ff25373c3cb3d24aea70273942b73
-
Size
10KB
-
MD5
e34ff25373c3cb3d24aea70273942b73
-
SHA1
39a615d30f483f72b3de63ba904759ffe9cfee1a
-
SHA256
d6ca937b595f49b770fee6b7a8a304d2d82cc861411e008bb75be8cff87363d7
-
SHA512
3dac25cab279965300f9d84700e53c979a5478a15e298374f1fb04731ec32e8d6b70e3178422d08434c4353ec60f83847703ed3dfd6065e361f4d0803395f6a1
-
SSDEEP
96:ylbrqC4RquUqCLm8VlTckBcf0hKMqizvWkQtgw:orqvqucLm8VrcchKMqijQtgw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e34ff25373c3cb3d24aea70273942b73
Files
-
e34ff25373c3cb3d24aea70273942b73.exe windows:4 windows x86 arch:x86
91b2790c505bbe69e215e722d884b1b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
crtdll
sprintf
kernel32
CreateProcessA
GlobalAddAtomA
GlobalFindAtomA
GetVersion
GetTempPathA
GetTickCount
ExitProcess
GetModuleFileNameA
CopyFileA
Sleep
CloseHandle
GetModuleHandleA
GetCurrentProcess
CreateFileA
ReadFile
SetFilePointer
WriteFile
GetFileSize
GlobalAlloc
DeleteFileA
user32
ExitWindowsEx
shell32
ShellExecuteA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ