Static task
static1
Behavioral task
behavioral1
Sample
584a7b71f8f967dadb5ffd11f3e06c9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
584a7b71f8f967dadb5ffd11f3e06c9a.exe
Resource
win10v2004-20231215-en
General
-
Target
584a7b71f8f967dadb5ffd11f3e06c9a
-
Size
801KB
-
MD5
584a7b71f8f967dadb5ffd11f3e06c9a
-
SHA1
4ce63a2c24a98b459ffecffe378547aa19713ff3
-
SHA256
5a3d01acc8ee6b41fe100c7566236f682f5bf6affa8fb925019608c2aac886d4
-
SHA512
63a7265647e982ad764699f58ef3bb4b92eea582826cf7cfddb17054a353ff6b32e2f4fe1a0b316c3bee1c5a1e3ded0e7b0a2f924a5818c45c3c7309ee685391
-
SSDEEP
24576:g6D7S4Ora6nN4qbnk6IeEuBuDXn0MoBZV:g6DUa6nN4YkjUuwlV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 584a7b71f8f967dadb5ffd11f3e06c9a
Files
-
584a7b71f8f967dadb5ffd11f3e06c9a.exe windows:5 windows x86 arch:x86
940416ae073b211ad93fc24f1c0f2f91
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessVersion
DeleteFileW
GetCurrentThreadId
LeaveCriticalSection
SetFilePointer
OpenMutexA
GetProcessHeap
InterlockedExchange
SetFileTime
GetDriveTypeW
FindAtomW
OpenEventA
GetModuleFileNameA
GetVolumePathNameA
GlobalFlags
PulseEvent
DeleteFileW
GetConsoleMode
GetFileAttributesA
HeapDestroy
VirtualProtectEx
CreateDirectoryA
CreateFileW
CreateFileW
GetModuleHandleA
user32
DispatchMessageA
SetFocus
MessageBoxA
GetWindowTextA
PeekMessageA
wsprintfA
SetRect
DestroyMenu
IsMenu
DestroyIcon
LoadCursorA
GetWindowLongA
GetWindowLongA
dot3msm
DllMain
Dot3MsmDisconnect
Dot3MsmFreeProfile
Dot3MsmDeInit
advapi32
IsValidAcl
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE