Static task
static1
Behavioral task
behavioral1
Sample
16e2fe30b0f10388e96d9a44ef6bb256.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16e2fe30b0f10388e96d9a44ef6bb256.exe
Resource
win10v2004-20231215-en
General
-
Target
16e2fe30b0f10388e96d9a44ef6bb256
-
Size
3KB
-
MD5
16e2fe30b0f10388e96d9a44ef6bb256
-
SHA1
a6fca09df3aefc27a681b8382709541b3cfad3dd
-
SHA256
9246fb9fe9866735ec27e7ebdef980d14a8cad97d1a4c0833e861b44966ee5d9
-
SHA512
4ff3a5b42cbef45cc536dd97f7f4cd865d5211137db2055e1dedd503eb07273cac18ac631893fa16362627e1d8d57285767250f864112d843cf47d92750b12ae
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16e2fe30b0f10388e96d9a44ef6bb256
Files
-
16e2fe30b0f10388e96d9a44ef6bb256.exe windows:4 windows x86 arch:x86
0c26cc098c588a2fb53b1ae8e60ef750
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryA
CreateProcessA
GetEnvironmentVariableA
CloseHandle
WriteFile
GetModuleFileNameA
CreateFileA
DeleteFileA
GetTempFileNameA
GetTempPathA
ExitProcess
HeapAlloc
GetProcessHeap
HeapFree
user32
GetKeyboardLayoutList
urlmon
URLDownloadToCacheFileA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE