Static task
static1
Behavioral task
behavioral1
Sample
08984acdf9a852cc28932c1f7351432d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08984acdf9a852cc28932c1f7351432d.exe
Resource
win10v2004-20231215-en
General
-
Target
08984acdf9a852cc28932c1f7351432d
-
Size
111KB
-
MD5
08984acdf9a852cc28932c1f7351432d
-
SHA1
9731a276125f4d363686448a5d0ea34908c71dcd
-
SHA256
d06747dc2197256ca4a77f82164891527021e94950c91225f32e14533441aa6a
-
SHA512
2d58850c9c4292bd56e4d6f899ce0bc5cf1e6c4ed7975b4428dd315475289a743a776df86db7e71cd01c331d92b6987eeee311e661f8851f4a548819ca12145e
-
SSDEEP
3072:eSUbxauaFNfQKPu+qxR/KpcTVTXBP6VhDycWyfGKiQ:eSGxhaFFQfxUe6pWyj1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08984acdf9a852cc28932c1f7351432d
Files
-
08984acdf9a852cc28932c1f7351432d.exe windows:4 windows x86 arch:x86
263f2c74198635066e799ddd460d8fcf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
RemoveDirectoryA
DeleteFileA
FreeLibrary
CloseHandle
GetProcAddress
LoadLibraryA
WriteFile
CreateFileA
CreateDirectoryA
lstrcmpA
GetFileAttributesA
GetTempPathA
GetModuleHandleA
GetFileSize
GetLastError
CreateMutexA
GetModuleFileNameA
VirtualAlloc
VirtualFree
user32
wsprintfA
MessageBoxA
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.gentee Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ