Static task
static1
Behavioral task
behavioral1
Sample
07411d7067ecf4359be76127069fe5ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07411d7067ecf4359be76127069fe5ff.exe
Resource
win10v2004-20231215-en
General
-
Target
07411d7067ecf4359be76127069fe5ff
-
Size
31KB
-
MD5
07411d7067ecf4359be76127069fe5ff
-
SHA1
c38f05f7b21819b156136f8e9bf8a3c3e85ef6b7
-
SHA256
05b963a57b793e556802d9afb5cf154edd8c7209cac55fafd6127c08d2e3dbb4
-
SHA512
3175af65ee1e07131cd13d380bb682a77ac7fb214b974965778cceb58f40ad584534135523a0d16699ec9a810ba9e78e2cf6dea7ea7ec7270435e94267761ddf
-
SSDEEP
768:wLwc4SAufkef+URbKxuek1VkMYoLDkaoc:MBrbmuJ1goLOc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07411d7067ecf4359be76127069fe5ff
Files
-
07411d7067ecf4359be76127069fe5ff.exe windows:4 windows x86 arch:x86
0bbd238386fa3375e36056597dfaf722
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
ExitProcess
GetStartupInfoA
GetCurrentProcess
TlsFree
GetSystemWindowsDirectoryW
GetProcessShutdownParameters
FatalAppExitA
DeleteVolumeMountPointA
GetTimeFormatW
DuplicateConsoleHandle
GetConsoleCommandHistoryLengthW
CreateDirectoryExA
lstrcpyn
GetEnvironmentStringsA
FreeEnvironmentStringsA
GetTickCount
GlobalReAlloc
TryEnterCriticalSection
GetThreadPriority
EnumUILanguagesA
CreateHardLinkA
SetConsoleCursorMode
SetFileApisToOEM
GetWriteWatch
ReadDirectoryChangesW
Sections
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ