Static task
static1
Behavioral task
behavioral1
Sample
5df4f004eb64fc14e942be7cb563fbc7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5df4f004eb64fc14e942be7cb563fbc7.exe
Resource
win10v2004-20231215-en
General
-
Target
5df4f004eb64fc14e942be7cb563fbc7
-
Size
17KB
-
MD5
5df4f004eb64fc14e942be7cb563fbc7
-
SHA1
e9aac318f6e7f5383b92a0a30a3412c10f84ca24
-
SHA256
5cb84b9c271cc8f89a6a824d69ee3d63ea0425feb2e831823f38aabf1dab000c
-
SHA512
a8993928ecc444a69d55d21eaae082429a5b2780b114a0839d92c7fc6b96a5205a7f93c820e9558f947a6d14b85017eff8d12cb879f18934880eb38428f1fae4
-
SSDEEP
384:EcflKDFbNCJ6Uc1vKcpD/DcXz0XowonmJjP:EcfWFkJg5v8zIowonmJj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5df4f004eb64fc14e942be7cb563fbc7
Files
-
5df4f004eb64fc14e942be7cb563fbc7.exe windows:4 windows x86 arch:x86
dda8554e25f87440552a70d992d2c7db
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
strncmp
strstr
strchr
atoi
strncpy
RtlRandom
sprintf
memset
_chkstk
kernel32
GetSystemDirectoryA
GetSystemTime
CloseHandle
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
CreateFileA
SetFilePointer
SystemTimeToFileTime
GetCurrentProcess
VirtualFree
GetWindowsDirectoryA
WriteFile
Sleep
TerminateProcess
ReadFile
VirtualAlloc
GetTimeZoneInformation
SetCurrentDirectoryA
GetLastError
GetProcAddress
iphlpapi
GetAdaptersInfo
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE