Static task
static1
Behavioral task
behavioral1
Sample
107fb7c23ad5890e1ec4b8442406bc7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
107fb7c23ad5890e1ec4b8442406bc7e.exe
Resource
win10v2004-20231215-en
General
-
Target
107fb7c23ad5890e1ec4b8442406bc7e
-
Size
72KB
-
MD5
107fb7c23ad5890e1ec4b8442406bc7e
-
SHA1
9c112abe70cb40f502fb22a10ed120860de647f5
-
SHA256
06a9541ed9d8118eb9cf0abe83319a0f848501f39e33f75f8fabc702096aa8be
-
SHA512
304aa4b271ceef926a98fa91537ef17c64b26fd182e9d2027a5039195a3eeda4c2ffeda58657ef365fa3fe1b0f77417c4c027cc04a6e99427e7f6d10f7e85545
-
SSDEEP
1536:+cH9CBppERtpgdB+Mnw8u2tppBWu79YiGtdCE:+GCTE5gSLD2t//u/C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 107fb7c23ad5890e1ec4b8442406bc7e
Files
-
107fb7c23ad5890e1ec4b8442406bc7e.exe windows:5 windows x86 arch:x86
16b41b5c4f87d1bd1099ee3ee19e708e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlen
HeapAlloc
HeapFree
GetProcessHeap
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrcat
ExitProcess
CreateFileA
GetTickCount
GetWindowsDirectoryA
WriteFile
Sleep
CreateProcessA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 706B - Virtual size: 706B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 472B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mackt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE