Static task
static1
Behavioral task
behavioral1
Sample
131208d363c91784525799224e8175fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
131208d363c91784525799224e8175fa.exe
Resource
win10v2004-20231215-en
General
-
Target
131208d363c91784525799224e8175fa
-
Size
794KB
-
MD5
131208d363c91784525799224e8175fa
-
SHA1
3ba31f02de273975828a80c060a252d5edddabc2
-
SHA256
2f91fbab440fb598e5d17ba3b33ea86ec8c0634595250dd13031fc8cf7aeb2c9
-
SHA512
07ca084df63731c0ba495755cc9f7e28f981792c6a290f268cdc6fc80bc64319340b197b1a10d4d6895e8c8ecb0e39b698e203c4e9077a69decc930119830dd6
-
SSDEEP
12288:nzFG72GCU+MjkdN7PtkmKOaQJSMyHxVgzmE71d1vf:zFG6GCUadNj1nshHxVSmEZv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 131208d363c91784525799224e8175fa
Files
-
131208d363c91784525799224e8175fa.exe windows:4 windows x86 arch:x86
aae67c07d9a7d40a692af5ae33ed427e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtAdjustGroupsToken
NtAllocateVirtualMemory
kernel32
Sleep
rpcrt4
CStdStubBuffer_Connect
IUnknown_Release_Proxy
NdrDllCanUnloadNow
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_QueryInterface
IUnknown_AddRef_Proxy
CStdStubBuffer_Invoke
NdrOleAllocate
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_AddRef
NdrCStdStubBuffer_Release
NdrDllGetClassObject
NdrOleFree
CStdStubBuffer_DebugServerQueryInterface
IUnknown_QueryInterface_Proxy
CStdStubBuffer_CountRefs
CStdStubBuffer_Disconnect
Sections
.text Size: 449KB - Virtual size: 448KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE