Static task
static1
Behavioral task
behavioral1
Sample
31bb425ea1ae67d89217aac80000c2f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
31bb425ea1ae67d89217aac80000c2f5.exe
Resource
win10v2004-20231215-en
General
-
Target
31bb425ea1ae67d89217aac80000c2f5
-
Size
108KB
-
MD5
31bb425ea1ae67d89217aac80000c2f5
-
SHA1
24a69af138cd37a9f5889e602d6d2accefefba90
-
SHA256
5cecec1793261016982d29f80523b4dddf9c0e056b027abde6f1752e66e33d43
-
SHA512
288b4732623571551383466633d09c2e2a08310117df4c25b11a08800230842111e97ef329ce2b5c1cd0946e849c2d0a44e095fce4fc4f17301d6cfd732334d4
-
SSDEEP
3072:7jrSoEoBpOrQg9hT/nIEj5JFeRsX9mu4c0oyqrH:nBBpQ1xn5rosNmuGoyc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 31bb425ea1ae67d89217aac80000c2f5
Files
-
31bb425ea1ae67d89217aac80000c2f5.exe windows:4 windows x86 arch:x86
fa8871a4510113324ddf83b32ec9e95b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
ReadFile
GetFileSize
CreateFileA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
GetStringTypeW
user32
FindWindowA
SendMessageA
MessageBoxA
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
S~yC Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE