Static task
static1
Behavioral task
behavioral1
Sample
1082ea99cce81dbc69ba60739a905b8e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1082ea99cce81dbc69ba60739a905b8e.exe
Resource
win10v2004-20231215-en
General
-
Target
1082ea99cce81dbc69ba60739a905b8e
-
Size
34KB
-
MD5
1082ea99cce81dbc69ba60739a905b8e
-
SHA1
1bfdf898c483d1ea423cf4e3f7bea0dfacda0752
-
SHA256
a524597eebf3246109ca8d00bab0a26e48da7c95fd1bbe46bba069212b8a3980
-
SHA512
26429035cb7b166bbdef8607f2e59dfeb3b5ff951d4d5b4a6eb1a50bdab7cafbff034b98e119dd2ae07d9c33128be26be31426955f1eb31055bfbe252e4532f0
-
SSDEEP
384:I0RtXysucBxDQtlqDWTgXPZWxduOYubPAnXn4:I07iBcBx7XPZYcW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1082ea99cce81dbc69ba60739a905b8e
Files
-
1082ea99cce81dbc69ba60739a905b8e.exe windows:4 windows x86 arch:x86
5ce96ab0e6c09edc89ba9348cf037069
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetTickCount
HeapAlloc
HeapReAlloc
IsBadStringPtrW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
exit
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcpy
strcspn
strlen
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 160B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE