Static task
static1
Behavioral task
behavioral1
Sample
255d67b520f42b90d77fe0cb68b017c0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
255d67b520f42b90d77fe0cb68b017c0.exe
Resource
win10v2004-20231215-en
General
-
Target
255d67b520f42b90d77fe0cb68b017c0
-
Size
43KB
-
MD5
255d67b520f42b90d77fe0cb68b017c0
-
SHA1
7911857fe716545d35ffdae9498a9206025a5041
-
SHA256
0fef24fbbdfeed3e064857a70464be0408321cc3eddb8da8a3829266252b4b80
-
SHA512
1e1cd755a6e3f078ff7ba7a1701b67618f9d147ef3f15d8a97722435fdb70cacfd6b92ce762c72e6c6b6c91213451481ad7fe8884d901d0de784cf66788368f8
-
SSDEEP
768:MxGin2vIHfWfgRLnnz3QvLMH/MAyd4cpv2n1lTzZ5MVtmDZOzDf5eZ2U1tyZF+KZ:5inQIHLnnzgvL884cpOlPTMrgIRO2Uuq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 255d67b520f42b90d77fe0cb68b017c0
Files
-
255d67b520f42b90d77fe0cb68b017c0.exe windows:5 windows x86 arch:x86
2c3f26105451afecfce7821bd61185c6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
CreateThread
lstrcatW
MoveFileExW
GetSystemTime
DisconnectNamedPipe
lstrcpynW
CreateFileMappingW
SetLastError
CreateEventW
GetSystemTimeAsFileTime
OpenProcess
SetThreadPriority
GetCommandLineA
GetDriveTypeW
GlobalLock
CreateMutexW
GetTempPathW
SetEvent
SetFileTime
ExpandEnvironmentStringsW
SetFileAttributesW
FindFirstFileW
lstrcmpiA
HeapFree
FlushFileBuffers
CreateProcessW
WriteFile
EnterCriticalSection
CloseHandle
user32
CharLowerBuffA
Sections
.ifwz Size: 35KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adyf Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rudwn Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ