Static task
static1
Behavioral task
behavioral1
Sample
4f7b9be65e44453fa6423e97c72d0277.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f7b9be65e44453fa6423e97c72d0277.exe
Resource
win10v2004-20231215-en
General
-
Target
4f7b9be65e44453fa6423e97c72d0277
-
Size
7KB
-
MD5
4f7b9be65e44453fa6423e97c72d0277
-
SHA1
a319b4ccc005ddf2019817260cbfa222f6b7311b
-
SHA256
ac6c0811578283dfcc8e2a8a6f5bdaa21548f73c7d0cd6309aa98581e53829a1
-
SHA512
f035da0c713ec29811cf9adb55b5e2564605db8abdd2281bb0d8ef57cc0503c0b27f562cb7be93f7bec20fe6262b5a7b63ff5660d45216ca193c79a9ab9ce5ce
-
SSDEEP
192:cPz7d8a4DljfGHUM8KjHfaJOyds0kv/v:Yz2aqbKSkXv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f7b9be65e44453fa6423e97c72d0277
Files
-
4f7b9be65e44453fa6423e97c72d0277.exe windows:4 windows x86 arch:x86
a797fccc4e6e5bdcdc726c576e55f415
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
lstrcatA
GetProcAddress
GetProcessHeap
GetModuleHandleA
CloseHandle
lstrcpyA
GetModuleFileNameA
VirtualQuery
InterlockedExchange
RtlUnwind
ExitProcess
CreateEventA
LoadLibraryA
CompareStringA
Process32First
CreateToolhelp32Snapshot
SetEvent
user32
EndPaint
GetTopWindow
IsWindow
advapi32
RegCloseKey
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE