Static task
static1
Behavioral task
behavioral1
Sample
084a2879e5fde41f0aaa388cccf41f28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
084a2879e5fde41f0aaa388cccf41f28.exe
Resource
win10v2004-20231215-en
General
-
Target
084a2879e5fde41f0aaa388cccf41f28
-
Size
16KB
-
MD5
084a2879e5fde41f0aaa388cccf41f28
-
SHA1
e291ddcfec4888c9cf0d07d134ea03ae78ec6648
-
SHA256
cb4d89638ac1fa947589c6f9f9cf8b14f911f61b9fdb3fc4a209c06e9e069461
-
SHA512
14e4fdaf85c266f400c256cbc2990ccdc153192ce32cc52652669c521d0e527e859530be77a428f1c2c6afb4c53638559840e8ae70afe553980e9eababab9f49
-
SSDEEP
96:kIpysX2/JTQMOxy8wughzlXvfP4oynO6:7IsXiJkhwZhzB3P4oynO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 084a2879e5fde41f0aaa388cccf41f28
Files
-
084a2879e5fde41f0aaa388cccf41f28.exe windows:4 windows x86 arch:x86
cbfed2b0ff4cc7df46c71aee93113b2d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
OpenProcess
LocalAlloc
LocalFree
CreateEventA
GetWindowsDirectoryA
CloseHandle
lstrcatA
CreateMutexA
GetLastError
ReleaseMutex
WaitForSingleObject
Sleep
SetEvent
advapi32
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
SetServiceStatus
StartServiceCtrlDispatcherA
shell32
ShellExecuteA
msvcrt
__setusermatherr
sprintf
_beginthread
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE