Static task
static1
Behavioral task
behavioral1
Sample
555360a1f5b676dd16a5861a74b6fd19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
555360a1f5b676dd16a5861a74b6fd19.exe
Resource
win10v2004-20231215-en
General
-
Target
555360a1f5b676dd16a5861a74b6fd19
-
Size
51KB
-
MD5
555360a1f5b676dd16a5861a74b6fd19
-
SHA1
2cf41460e6f63ccf69dde9d5139e71e28713f58e
-
SHA256
ae9531c689015a8ccb831cd65493b9db89086ae403707f1be65f09247aa405d8
-
SHA512
ad4affa05e408c1c9c5f533a25aef4443023ad01aae13eac988d959aa7055631858660c189cfa89338bd2c8a63957748fccc1d48782fd4f0acfa1ee2a95bfe76
-
SSDEEP
768:zVMi8Zaq1EyuOfX1IIm1uJKDCD37fv3uzKUE6aI9WuE/W09IGA:BMi8ZxEIv1IImAJK27fv3uz8M8nIt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 555360a1f5b676dd16a5861a74b6fd19
Files
-
555360a1f5b676dd16a5861a74b6fd19.exe windows:4 windows x86 arch:x86
bb360574fa20eb3ee3a71408ec5abc1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_encode_pointer
__set_app_type
_crt_debugger_hook
_unlock
__p__fmode
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
__dllonexit
memset
kernel32
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
Sleep
GetModuleHandleA
GetProcAddress
GetSystemTimeAsFileTime
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ