Static task
static1
Behavioral task
behavioral1
Sample
586a9db8aaa9232d49cf3c420f36e8d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
586a9db8aaa9232d49cf3c420f36e8d0.exe
Resource
win10v2004-20231215-en
General
-
Target
586a9db8aaa9232d49cf3c420f36e8d0
-
Size
265KB
-
MD5
586a9db8aaa9232d49cf3c420f36e8d0
-
SHA1
f64f60acfd352101ecc997c6176c20432aa3fdff
-
SHA256
ac96c20c6b95aa310855f9e1e26d662c3cebca0fda4df71c9a15f9bb625b97d5
-
SHA512
ce2a5ce3cf3efc6933cc70855d16dff678dda2f5e3e69dca36060e8fa3c3408d7055a445f4bc0e655556a5f031314e174bff4f38a2d274bffde45046c556d96f
-
SSDEEP
6144:m+lXbW+BfrXIsEreTDA91yXOPr92odusI3F/tRSdKb:3lrPlXIsIussM96fRS0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 586a9db8aaa9232d49cf3c420f36e8d0
Files
-
586a9db8aaa9232d49cf3c420f36e8d0.exe windows:4 windows x86 arch:x86
5a3ee38af4e756ea7325408a604ab5c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
WaitForSingleObject
CreateSemaphoreW
EnumDateFormatsExA
ReleaseSemaphore
GetCommandLineW
GetProcAddress
LoadLibraryW
FreeLibrary
DeleteFileW
LocalAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
InterlockedExchange
GetModuleHandleW
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualProtect
GetCurrentThreadId
FoldStringW
GetLocaleInfoW
Sleep
oleaut32
SafeArrayDestroyDescriptor
SysAllocStringByteLen
SafeArraySetIID
SysReAllocStringLen
OleIconToCursor
ClearCustData
SetOaNoCache
msvfw32
ICInfo
Sections
.text Size: 169KB - Virtual size: 205KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ