Static task
static1
Behavioral task
behavioral1
Sample
24624dbc079c6a9534f0b82760c9ff4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24624dbc079c6a9534f0b82760c9ff4f.exe
Resource
win10v2004-20231222-en
General
-
Target
24624dbc079c6a9534f0b82760c9ff4f
-
Size
27KB
-
MD5
24624dbc079c6a9534f0b82760c9ff4f
-
SHA1
53c4fe92d0195f332c1384227f75893c09d13de6
-
SHA256
255dedad5657fcdec6f0cc0626982f768b6504d47f41dd14ee564d1a2443e20b
-
SHA512
b79da0dedbafa40a913bf5a0fae436f4a423e0fc5cdc4a542195313ebdc66356d37a78e71f460b5feb754c385d17044127a1f351aec40ef55c43d19dc07cd0cb
-
SSDEEP
384:pofTgT8Vnxw97UTw6AlT+WymHDq+JxKTo7p6:pofT5x27UTyiWyTkH7p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24624dbc079c6a9534f0b82760c9ff4f
Files
-
24624dbc079c6a9534f0b82760c9ff4f.exe windows:4 windows x86 arch:x86
b06138dc1423747c47ee350412c4c6c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
GetModuleHandleA
GetVersionExA
LocalFree
Sleep
lstrcpyA
GetLastError
GlobalAlloc
GetCommandLineA
GetFileSize
lstrcatA
CreateEventA
GetStdHandle
LocalAlloc
GetTickCount
FreeLibrary
lstrlenA
GetStartupInfoA
user32
GetMessageA
DialogBoxParamA
ShowWindow
CreateWindowExA
LoadIconA
GetClientRect
TranslateMessage
EndDialog
GetSysColor
gdi32
GetBkColor
MoveToEx
CreateFontIndirectA
GetStockObject
CreateCompatibleDC
DeleteObject
ExtTextOutA
SetROP2
msvcrt
_adjust_fdiv
exit
_XcptFilter
wcslen
__getmainargs
wcstoul
toupper
_acmdln
_c_exit
__p__fmode
_exit
_controlfp
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ