Static task
static1
Behavioral task
behavioral1
Sample
373aefc992910fe4836ea3ff8a097a3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
373aefc992910fe4836ea3ff8a097a3f.exe
Resource
win10v2004-20231215-en
General
-
Target
373aefc992910fe4836ea3ff8a097a3f
-
Size
3KB
-
MD5
373aefc992910fe4836ea3ff8a097a3f
-
SHA1
a07462adbcc94da3db9f524850b2e70c6b306748
-
SHA256
88b6bf40f59afc73fce467e22eef71ed09941a635eecaaaad13234e4b7cc2f0e
-
SHA512
aad8e8dd4ace9ffc4923e7196673445a8b5e9a9bd57214ec45e729bc2503c8bc5f992139bfcc989a295f072b0421170085af4737dc90aad0129bfaae0091f539
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 373aefc992910fe4836ea3ff8a097a3f
Files
-
373aefc992910fe4836ea3ff8a097a3f.exe windows:1 windows x86 arch:x86
c25ec321ca540bed11e701db67551ed6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
LdrLoadDll
ZwAllocateVirtualMemory
ZwWriteVirtualMemory
ZwProtectVirtualMemory
LdrGetDllHandle
kernel32
CloseHandle
CopyFileA
CreateProcessA
ExitProcess
GetCommandLineA
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
IsBadReadPtr
ResumeThread
WideCharToMultiByte
lstrlenA
advapi32
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegSetValueExA
user32
wsprintfA
ws2_32
connect
send
socket
gethostbyname
WSAStartup
Sections
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE