Static task
static1
Behavioral task
behavioral1
Sample
785df90ec05281d1d7bf7838d3505eb2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
785df90ec05281d1d7bf7838d3505eb2.exe
Resource
win10v2004-20231215-en
General
-
Target
785df90ec05281d1d7bf7838d3505eb2
-
Size
129KB
-
MD5
785df90ec05281d1d7bf7838d3505eb2
-
SHA1
c2c145bf83f0aac0da0132cf5918b058f189996c
-
SHA256
b7938f09a0c2aeed444ec9e33414f051c54c3cef75e7c040b7c10648c5b16789
-
SHA512
bb27ca47e801c7300f2f02f118771e8affc7640d442739a8264d30f6b7d14a52b4bb7524346a8a39e49a176642bb19358bf8f7e0f5c0dfee288ae48deb3813e7
-
SSDEEP
3072:zrJXRo7+Dkxqf4SFi0mvElimUiasGXEG7C60PvvRz:/vGA4SsklimLh4yvRz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 785df90ec05281d1d7bf7838d3505eb2
Files
-
785df90ec05281d1d7bf7838d3505eb2.exe windows:1 windows x86 arch:x86
3e1180b6a8bd4d1be1c25737b1549b8d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetModuleFileNameA
CreateProcessA
CreateFileA
GetFileSize
ReadFile
VirtualAllocEx
WriteProcessMemory
GetThreadContext
SetThreadContext
ResumeThread
CloseHandle
LocalFree
ExitProcess
ntdll
ZwUnmapViewOfSection
Sections
.e0n Size: 859B - Virtual size: 860B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE