Static task
static1
Behavioral task
behavioral1
Sample
27bd297a850433ec8abfe1f08bddaac6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
27bd297a850433ec8abfe1f08bddaac6.exe
Resource
win10v2004-20231215-en
General
-
Target
27bd297a850433ec8abfe1f08bddaac6
-
Size
39KB
-
MD5
27bd297a850433ec8abfe1f08bddaac6
-
SHA1
679a06aacd509a0dc26a19b2c5a7bd82ca1864c8
-
SHA256
03d64c59e70a754c2e6a8d726ea46f915995afdc5af6f681c7b82bdb9606f1ce
-
SHA512
c80e2e1f73cca13d86ef242284834c6437f607018c36fe5942cbaf10b955fa5cb456682088ab79776ea3d6063ac882423644e8ba7c7302bdf64a1795d709f4d1
-
SSDEEP
768:7lM9TUH/ri8Kmpu6u90K1Vr/rjH7WrCZS6MHD5kRz:xMsKmY6u1jTDsCtMHNkRz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27bd297a850433ec8abfe1f08bddaac6
Files
-
27bd297a850433ec8abfe1f08bddaac6.exe windows:4 windows x86 arch:x86
b7ac57d17c948321cb90d09db6cde9fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LocalAlloc
GetModuleFileNameA
GetModuleHandleA
ContinueDebugEvent
IsDebuggerPresent
WaitForDebugEvent
CheckRemoteDebuggerPresent
lstrcmpA
LocalFree
lstrlenA
lstrcpyA
GetCurrentProcess
CreateProcessA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
Sections
.f0Gx Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ