Static task
static1
Behavioral task
behavioral1
Sample
4fc3095c7e07a7674dcf38b244012455.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4fc3095c7e07a7674dcf38b244012455.exe
Resource
win10v2004-20231222-en
General
-
Target
4fc3095c7e07a7674dcf38b244012455
-
Size
9KB
-
MD5
4fc3095c7e07a7674dcf38b244012455
-
SHA1
a75e67515a4c2e4d1cc93b9ef43aed9ff722533c
-
SHA256
467cadfc649bff160e593e0fb4dd3019e138acbd9728ffd0266fa857ad4c05ab
-
SHA512
1ebcb72092af4f77aa7e55ee15fa4aa9f067e8a4344fade455c3ce6f5a69a16b54529567b9384b344b52842a9028cf4896265b42f822c7c43f9eab1715b9116b
-
SSDEEP
96:k3tD5p7GTbHr07mmo1+WEa1UCJxzq+5441O9B3X+gkz1Ubl+q:kNj7GI8PELCPzq+544GB3X+gkz1UA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4fc3095c7e07a7674dcf38b244012455
Files
-
4fc3095c7e07a7674dcf38b244012455.exe windows:4 windows x86 arch:x86
21df09f31e29873c28581c418df756e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
memcpy
kernel32
GetModuleHandleA
HeapCreate
GetProcAddress
GetModuleFileNameA
HeapDestroy
ExitProcess
GetThreadContext
VirtualAllocEx
SetThreadContext
ResumeThread
TerminateProcess
CloseHandle
CreateFileA
SetFilePointer
ReadFile
GetFileSize
Sleep
HeapFree
HeapAlloc
WriteFile
HeapReAlloc
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 512B - Virtual size: 105B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE