Static task
static1
Behavioral task
behavioral1
Sample
2accda6c32d8cc18ef46a401d8472683.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2accda6c32d8cc18ef46a401d8472683.exe
Resource
win10v2004-20231222-en
General
-
Target
2accda6c32d8cc18ef46a401d8472683
-
Size
9KB
-
MD5
2accda6c32d8cc18ef46a401d8472683
-
SHA1
ed48a87cbc7e8ada9a96c11c950123c857becc58
-
SHA256
d2caa6beab8d317fa9fdddac00b6b512060441fc78c8a4a30fdacb91a4d26dd7
-
SHA512
5cf5419bb56a979debc383ecf61df4edb75f085405c67b5ddd4102e275cf3314409339b807b269cae4e4f094ef3afd79deaf83c48a8e30f25d97e8ca1dc5ed35
-
SSDEEP
192:qyYgnvZ82qoi/CGxlXyymDw+iWXi0e14oBu7lR:qyvZ8NNCwZx0i03Su7l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2accda6c32d8cc18ef46a401d8472683
Files
-
2accda6c32d8cc18ef46a401d8472683.exe windows:4 windows x86 arch:x86
7788e3eb97c993d419b233e1df236e5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
lstrcatA
lstrcpyA
CreateThread
GetPrivateProfileStringA
CopyFileA
GetDriveTypeA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
DeleteFileA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
CreateDirectoryA
lstrlenA
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE