Static task
static1
Behavioral task
behavioral1
Sample
1758a123d916d8805978d8a1cba4c432.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1758a123d916d8805978d8a1cba4c432.exe
Resource
win10v2004-20231215-en
General
-
Target
1758a123d916d8805978d8a1cba4c432
-
Size
35KB
-
MD5
1758a123d916d8805978d8a1cba4c432
-
SHA1
71d5d92fd2c0019de20cc657ec381205d8995dbc
-
SHA256
812a1ba81d2bae7405d543ed0b4f099c3bd1dad81bf0d4b08b080a326657ee50
-
SHA512
cb8f6529e9c2be761f5c0cd8a23f0612934477a133a0bf6346e245ec0c90921c7f7e9f00454aee48d03e9725a2bce920e95cc62650dd8b716e93f3df569b7dc8
-
SSDEEP
384:7poYCt8tnSaybxMiCS8PFBbiRlCs2BdfwXTexHvUTxsvd0vWpZB35z8ORBu/bQ0w:7ECIaazIDivSBcTeHdbZXdR4/bx0F3eo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1758a123d916d8805978d8a1cba4c432
Files
-
1758a123d916d8805978d8a1cba4c432.exe windows:4 windows x86 arch:x86
d3a008f4f08a505723cdb1f0aaf0d3a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
GetProcAddress
LoadLibraryA
VirtualProtectEx
GetThreadContext
CreateProcessA
GetCommandLineA
SetThreadContext
ReadProcessMemory
ResumeThread
user32
GetDC
gdi32
SetTextColor
GetTextColor
Sections
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE