Static task
static1
Behavioral task
behavioral1
Sample
279e4b36527268f147af0f07e91bf272.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
279e4b36527268f147af0f07e91bf272.exe
Resource
win10v2004-20231215-en
General
-
Target
279e4b36527268f147af0f07e91bf272
-
Size
674KB
-
MD5
279e4b36527268f147af0f07e91bf272
-
SHA1
882d390271025a9fe766522707a6e55e71204c91
-
SHA256
28e12f4eab7acab7b98bd0ffd6f5003bde0f0994da2497fdb9ce61dfda3c8a14
-
SHA512
7baef741912ae5dd29475122ae9d387b7cc17cb5be43f926b7d40208d434c9b458075a2a302a358d3569b94aef9c08faf0fc978a1d26de2bfd2536ae0ddda092
-
SSDEEP
12288:QZ2zG8GzJipNMQe6lmd0yS0C875TehNgNrAGEjIBKIPU1lHl35cUV/wr8URU3Z/:6cjMipNM36lmd0TkTVqGEjoKIIHlpcwB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 279e4b36527268f147af0f07e91bf272
Files
-
279e4b36527268f147af0f07e91bf272.exe windows:4 windows x86 arch:x86
5f2df7257758bf2707e2911007001ebd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CreateThread
LoadLibraryA
FindResourceA
GetModuleHandleA
LocalAlloc
LocalFree
GetCommandLineW
GlobalAlloc
GlobalFree
SetEvent
CreateProcessA
ExitProcess
GetTickCount
user32
GetClientRect
GetWindowRect
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
ShowWindow
UpdateWindow
CreateWindowExA
LoadBitmapA
SendMessageA
DestroyWindow
Sections
.text Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 356KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
. Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ