Static task
static1
Behavioral task
behavioral1
Sample
334b9f1188b0617d071d4ae6feab4de4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
334b9f1188b0617d071d4ae6feab4de4.exe
Resource
win10v2004-20231215-en
General
-
Target
334b9f1188b0617d071d4ae6feab4de4
-
Size
7KB
-
MD5
334b9f1188b0617d071d4ae6feab4de4
-
SHA1
f922c4fcdb5d828c93a3dd082b6f871055a40a30
-
SHA256
3a1fd8faa2506ecac2314cb22ce02fe901fbb52d3f9bbb4a77194c486d7ef305
-
SHA512
81af7280f062902c752292df364833bb809de95b9d39bfeb8062b4ad7d7d153abe78f907d5edc635b9f6ddb01a1a779b72fe495d83818006d4c06f0d3c7c0763
-
SSDEEP
192:+u8Bm7EA/W/xO031D9sR4ghf9AQuT61oy:1zcx5sR4wT861
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 334b9f1188b0617d071d4ae6feab4de4
Files
-
334b9f1188b0617d071d4ae6feab4de4.exe windows:4 windows x86 arch:x86
f683366ddf493cd68d5fc61a44ca3135
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
Sleep
SetUnhandledExceptionFilter
GetModuleFileNameA
ExpandEnvironmentStringsA
SetLastError
lstrcmpiA
lstrlenA
lstrcpyA
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
lstrcatA
GetLastError
GetModuleHandleA
GetStartupInfoA
user32
PostThreadMessageA
GetInputState
wsprintfA
GetMessageA
advapi32
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
StartServiceA
OpenSCManagerA
CreateServiceA
msvcrt
??1type_info@@UAE@XZ
_controlfp
_except_handler3
strchr
fclose
fwrite
fopen
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
strstr
??3@YAXPAX@Z
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ