Static task
static1
Behavioral task
behavioral1
Sample
27df4c47b9785dea3bdee48663465472.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27df4c47b9785dea3bdee48663465472.exe
Resource
win10v2004-20231215-en
General
-
Target
27df4c47b9785dea3bdee48663465472
-
Size
44KB
-
MD5
27df4c47b9785dea3bdee48663465472
-
SHA1
e6e9b4e21daab8b2ad819db1a3d67cdaf4aea796
-
SHA256
2e7238fbc308af5e85759f44581fa4abfa65d2fd9d71018b8b64f0c55b520e35
-
SHA512
2e3d4ac55dd949eade624569ba5bd24c37a21e27867f8373c168930041c306e446bf50b95ca47cac47474f4200c4ee2b314eccda68f280da1f6b610bee04b1ae
-
SSDEEP
768:9/pA0WoUYrAnNjBBZWJhs/AELjYzACrbEoy:zAzzuANhgEAEHoy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27df4c47b9785dea3bdee48663465472
Files
-
27df4c47b9785dea3bdee48663465472.exe windows:4 windows x86 arch:x86
1dc500425308ca5f51b086e5436523af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
VirtualProtectEx
VirtualAllocEx
WriteProcessMemory
DeleteFileA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
SetThreadContext
ResumeThread
TerminateProcess
GetStartupInfoA
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAlloc
VirtualQueryEx
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
GetLastError
CloseHandle
WriteFile
ReadFile
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
SetStdHandle
FlushFileBuffers
CreateFileA
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
advapi32
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextA
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE