Static task
static1
Behavioral task
behavioral1
Sample
11f99ef1199f27b191e21462aab43f7e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
11f99ef1199f27b191e21462aab43f7e.exe
Resource
win10v2004-20231215-en
General
-
Target
11f99ef1199f27b191e21462aab43f7e
-
Size
20KB
-
MD5
11f99ef1199f27b191e21462aab43f7e
-
SHA1
3bd90dec8878894928f4b420e5aefd17cd77ab3a
-
SHA256
aa793311c9983904df942f7a10b3d08db0e9323c77635ede03647cae596ba06c
-
SHA512
e81bf618c5479c4ed351598bb8aad21a2ad28802c2d62580b5753e4feeb78bb8a8d1b5db3e66071208960c109bfebfee113677d4ed0bfafe9ef792f4b7c4fc4c
-
SSDEEP
384:1M4HoOOB6Hj0wKfKfLTcJw2aTOxg/LDbdhKBfkWn+Z4nBr:NIOdjKfKfLyNxgbnKFo+N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11f99ef1199f27b191e21462aab43f7e
Files
-
11f99ef1199f27b191e21462aab43f7e.exe windows:5 windows x86 arch:x86
c49980d2bb3e6d3ae4771de8dc1b48bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetModuleFileNameW
SetEnvironmentVariableW
IsWow64Process
GetCurrentProcess
GetCommandLineW
OpenProcess
GetLastError
DuplicateHandle
GetVersionExW
CreateFileW
CreateFileMappingW
MapViewOfFile
VirtualQuery
UnmapViewOfFile
CloseHandle
OpenFileMappingW
SetEvent
GetFileSizeEx
VirtualAlloc
VirtualFree
GetModuleHandleA
GetProcAddress
LoadLibraryW
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 964B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ