Static task
static1
Behavioral task
behavioral1
Sample
4a21f1fbb19a71c717c65bd0d332ac06.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a21f1fbb19a71c717c65bd0d332ac06.exe
Resource
win10v2004-20231215-en
General
-
Target
4a21f1fbb19a71c717c65bd0d332ac06
-
Size
103KB
-
MD5
4a21f1fbb19a71c717c65bd0d332ac06
-
SHA1
82de46fcff07f4a1c9c291ea3652244d1412793b
-
SHA256
8ee25a27a31343a158d2e585bb8e85c503e39a6cba91790a704df534216862e9
-
SHA512
0b4b062e022726ba15a1aca2e3951d3fb7fd4e1c80a8f3174c86eb414fb39326f6d37ad85a22438a0bb9f6ee692c5cc3ffd3369b214e77c72bba1f111d49adcd
-
SSDEEP
3072:FKnLpwB6BoNnJJHj04atOXKO6+ALebRzHrbO030gWnx:0pYOX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a21f1fbb19a71c717c65bd0d332ac06
Files
-
4a21f1fbb19a71c717c65bd0d332ac06.exe windows:4 windows x86 arch:x86
54d7fb846380c34cf56067e9e13ef783
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
MoveFileExA
HeapFree
WriteFile
Sleep
DeleteFileA
CloseHandle
ReadFile
HeapAlloc
GetProcessHeap
GetFileSize
CreateFileA
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
CopyFileA
GetTickCount
GetTempPathA
GetModuleFileNameA
GetCommandLineA
RtlUnwind
user32
wsprintfA
shlwapi
StrRChrA
StrStrIA
Sections
KXover Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ