Static task
static1
Behavioral task
behavioral1
Sample
2df0007df364c08b367dfe05f47e9453.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2df0007df364c08b367dfe05f47e9453.exe
Resource
win10v2004-20231215-en
General
-
Target
2df0007df364c08b367dfe05f47e9453
-
Size
151KB
-
MD5
2df0007df364c08b367dfe05f47e9453
-
SHA1
33651f9a7efcd85b15d216bfdafe49e1c30cf6ef
-
SHA256
51a55b998cd92bf4dd258f0c8d4d0e1ce74314f691a53cbc988e9c5c6b011c7b
-
SHA512
af669384cf878bee283ee7dffe4a78d3225381de56655ff649c032a2d248ed36f0d824888e427749c8ff51afd1bcaa0b47868131f0a06ed01b5834a4e4a1b342
-
SSDEEP
3072:E/VNiYFHDPE5DZa/KE2KawoZiHtPnyh8AjwPonn1:ENNnFHDPE5sc2yh8A/1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2df0007df364c08b367dfe05f47e9453
Files
-
2df0007df364c08b367dfe05f47e9453.exe windows:4 windows x86 arch:x86
6039c26165040db47e28057ca34786ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
srand
memcmp
strcat
isdigit
isspace
memcpy
rename
memset
_EH_prolog
__CxxFrameHandler
strcmp
strncpy
strstr
strcpy
rand
abs
strlen
user32
MessageBoxA
wvsprintfA
kernel32
GetModuleHandleA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
GetTickCount
GetStartupInfoA
GetCommandLineA
ExitProcess
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ