Static task
static1
Behavioral task
behavioral1
Sample
2743be6968b01b0584830f9b2297dd51.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2743be6968b01b0584830f9b2297dd51.exe
Resource
win10v2004-20231222-en
General
-
Target
2743be6968b01b0584830f9b2297dd51
-
Size
315KB
-
MD5
2743be6968b01b0584830f9b2297dd51
-
SHA1
d2b5f774e8dc217bba8c92cf254f9e95eb4a5cac
-
SHA256
a74fd03743f01e1336ceb1263eabf0b596b445ec77d526a9277c50b27f82e213
-
SHA512
c275177a73b818b3df46a2b848d3594ea84f7b87a76fd39bf8ac820335a54146b79295df547589b63ac04e578593ca2a002574624256a9a8c803f333dc45a27f
-
SSDEEP
6144:IdNHHXOl4UgMzuDNrVcb+6VzjEvix9WXh9s0lMv9szq4XOR:6nX2g/DNVcb4vix9T9s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2743be6968b01b0584830f9b2297dd51
Files
-
2743be6968b01b0584830f9b2297dd51.exe windows:4 windows x86 arch:x86
0308f778791c5c98edf6595072b4ea72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
VirtualFreeEx
VirtualProtectEx
ReadProcessMemory
WriteProcessMemory
CreateProcessA
GetModuleFileNameA
GetCurrentProcess
SetThreadContext
ResumeThread
GetThreadContext
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
msvcrt
malloc
fclose
??3@YAXPAX@Z
fread
fseek
fopen
free
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Wpack Size: 307KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE