Static task
static1
Behavioral task
behavioral1
Sample
75d32c768ea01a1838d66083b0de36ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75d32c768ea01a1838d66083b0de36ba.exe
Resource
win10v2004-20231222-en
General
-
Target
75d32c768ea01a1838d66083b0de36ba
-
Size
50KB
-
MD5
75d32c768ea01a1838d66083b0de36ba
-
SHA1
cd9f39f3a055a0c69ccfdd316cf24873cbd5932a
-
SHA256
d5bfea3aaf87b43988a16aa543b964d3cc22eaa3fe461acc38535f1a0488b221
-
SHA512
273a65ac0f9de138495062735bf96045744c034ebf546a5ac4620ef5c5a4580fb13992cf515d3d7b15e280a508293b897bca6572bdec452c3cc1f7a03951094c
-
SSDEEP
768:pEuvj3hfmhGMDVyWWPLSRPJ8YL5IO6nToIf1vQoR3+rrS6:v3d4uI15IO6nToIf68uy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75d32c768ea01a1838d66083b0de36ba
Files
-
75d32c768ea01a1838d66083b0de36ba.exe windows:5 windows x86 arch:x86
9c219d4fc2467a94ebbf8783550e71a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetComputerNameA
GetFileSize
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
Sleep
HeapDestroy
HeapCreate
ReadFile
GetModuleFileNameW
CreateFileW
VirtualAlloc
CloseHandle
FreeLibrary
WaitForSingleObject
IsBadReadPtr
LoadLibraryA
VirtualProtect
CreateThread
GetModuleHandleA
GetStartupInfoA
msvcrt
??2@YAPAXI@Z
_stricmp
free
strchr
realloc
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
memcpy
memset
Sections
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ