Static task
static1
Behavioral task
behavioral1
Sample
30f1242a88865100bc5cb717c0a9f065.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
30f1242a88865100bc5cb717c0a9f065.exe
Resource
win10v2004-20231215-en
General
-
Target
30f1242a88865100bc5cb717c0a9f065
-
Size
15KB
-
MD5
30f1242a88865100bc5cb717c0a9f065
-
SHA1
aaeb8d2ba5d83d00aef845eeae20502287174d98
-
SHA256
58c8897c3b553a3601c7679b8c68386f7b0a2bb4aaca33445056fd2183d28e84
-
SHA512
70c93fcb95ef7ab847ef0e5c81d4490fff639c33e8ff055897602ea584508881c9f118f51b424b94294ed8b4172ca44b5e897e0f69c76b289d25e2ea1553f2e0
-
SSDEEP
384:fYIxScnmXjJ3d4UrefchutuZGVk1jEHhVXC95OXK7e4i:PzwzrZhut0G21wHh495Oa7e5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30f1242a88865100bc5cb717c0a9f065
Files
-
30f1242a88865100bc5cb717c0a9f065.exe windows:4 windows x86 arch:x86
2d6418f6ab85d3f3723b759e78bbc7a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlUnicodeStringToOemSize
RtlUnicodeStringToOemString
RtlUnicodeToCustomCPN
RtlUnicodeToMultiByteN
RtlUnicodeToMultiByteSize
RtlUnicodeToOemN
RtlUniform
RtlUnlockBootStatusData
RtlUnlockHeap
RtlUnlockMemoryStreamRegion
Sections
.DATA Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tlss Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NewIT Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE