Static task
static1
Behavioral task
behavioral1
Sample
410876835e4b31bf6f4033b9d6bcbb3a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
410876835e4b31bf6f4033b9d6bcbb3a.exe
Resource
win10v2004-20231215-en
General
-
Target
410876835e4b31bf6f4033b9d6bcbb3a
-
Size
87KB
-
MD5
410876835e4b31bf6f4033b9d6bcbb3a
-
SHA1
90f11f68ffd291e098a53504aa2b673238fdd980
-
SHA256
68261bf9132f85df95d910a00bd161ab77f5fd8e652d0f62db0cc6c4e041988a
-
SHA512
c25e296597280fec20d843e76bd8dd4bb0a54b59ce6f13ed14c6a64ec752a6d6f0ee1371fb60629ae50479c1efb559f4975ddef3f0e3cb3f69ebb4a511222247
-
SSDEEP
1536:kkVaFyGvl8ZB504h8EOO+ueJZXlMX4ermdFKUXn:k9U3Vh8/u0fMmdQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 410876835e4b31bf6f4033b9d6bcbb3a
Files
-
410876835e4b31bf6f4033b9d6bcbb3a.exe windows:4 windows x86 arch:x86
da8d7dc36e37b406dd1a04e747fe3534
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
SetEvent
WriteConsoleA
DeleteFileA
GetProcessHeap
CreateFileA
GetModuleFileNameA
lstrlenA
SetLastError
CreateDirectoryW
CreateSemaphoreW
HeapSize
ReadConsoleA
LoadLibraryA
GlobalFree
Sleep
SetLocalTime
GetFileSize
GetStartupInfoA
OpenSemaphoreA
GetEnvironmentStringsA
GetFileAttributesW
GetTickCount
VirtualProtect
SetLastError
user32
CallWindowProcW
DrawTextW
SetFocus
IsZoomed
GetWindowLongA
DestroyMenu
GetClassInfoA
FindWindowA
DispatchMessageA
GetSysColor
IsWindow
DispatchMessageA
PeekMessageA
traffic
TcDeleteFlow
TcAddFilter
TcDeleteFilter
TcAddFlow
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE