Static task
static1
Behavioral task
behavioral1
Sample
27f34b7ea3739e333719316d1652b0f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27f34b7ea3739e333719316d1652b0f5.exe
Resource
win10v2004-20231222-en
General
-
Target
27f34b7ea3739e333719316d1652b0f5
-
Size
44KB
-
MD5
27f34b7ea3739e333719316d1652b0f5
-
SHA1
43049bbbf1e2c794ab42a62dc1cef71f259b5c93
-
SHA256
cbcc513ca1345940133039f9e8776e1acca2cafce30827b277ac7339b756c9d7
-
SHA512
ee05d9c2e610aa76d9e6aa9e5a8db7e87930817433395ecf9c05caaa899e548573baa55cc28be38945a9f28173d74646709d2a938f9911cb52ce39a0fac2cb56
-
SSDEEP
768:z32pfKk7zNRW3vosiO0EL7ORRjVQ6bkL7kl+0OxcPBRIFtEyw:z32png3AsiTQOKVLG+8Ib
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27f34b7ea3739e333719316d1652b0f5
Files
-
27f34b7ea3739e333719316d1652b0f5.exe windows:4 windows x86 arch:x86
c0d5a15991fbbee70da0f6fdf7e75a36
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
FindAtomA
lstrcmpA
lstrlenA
GetModuleFileNameA
lstrcpynA
CreateMutexA
CloseHandle
GetVersion
GetTickCount
GetTempPathA
GetSystemTime
WriteFile
lstrcpyA
GetCommandLineA
CreateProcessA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
GetVersionExA
RtlUnwind
IsDebuggerPresent
user32
wsprintfA
ClientToScreen
GetCursorPos
GetCaretPos
EqualRect
GetWindowRect
IsWindowVisible
GetFocus
InflateRect
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE