Static task
static1
Behavioral task
behavioral1
Sample
19b9bf99ad2aa4dc16350daa649deec3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19b9bf99ad2aa4dc16350daa649deec3.exe
Resource
win10v2004-20231222-en
General
-
Target
19b9bf99ad2aa4dc16350daa649deec3
-
Size
128KB
-
MD5
19b9bf99ad2aa4dc16350daa649deec3
-
SHA1
d4d9e69980c9beaf633a05efb70a07fa48bd54b2
-
SHA256
d104e3d93ca292154e5ff4e0f264bd0c501f3b0182e80fad046623309975867f
-
SHA512
ae4e7cbe0c4d9a1df86041092181299e425e0c1921a4cd43ec9d2c77ace3862853e8866a18f3f0ad1e71081506559c9d48f63015aacf970914eda70e277b58e7
-
SSDEEP
3072:xtLv8e2pPUyRK13tDFTocr5fKWpaPu3oFgEC:LLke01R8Pocr5SoaG4Fg1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19b9bf99ad2aa4dc16350daa649deec3
Files
-
19b9bf99ad2aa4dc16350daa649deec3.exe windows:4 windows x86 arch:x86
2b221e1576750deb7fd25911a1bcd766
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
GetConsoleMode
WriteTapemark
ProcessIdToSessionId
ReadFile
FlushFileBuffers
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
icode Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
idata Size: - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ