Static task
static1
Behavioral task
behavioral1
Sample
58bdabb4fd691bef1354503ca094ca84.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58bdabb4fd691bef1354503ca094ca84.exe
Resource
win10v2004-20231215-en
General
-
Target
58bdabb4fd691bef1354503ca094ca84
-
Size
36KB
-
MD5
58bdabb4fd691bef1354503ca094ca84
-
SHA1
3d742932e8568e2e11d2eb6822d65be1d37a4af1
-
SHA256
03c2502a45b7a341563baddc3d904b59c930e150ac43bf94e596d5ae57fd3cda
-
SHA512
6e48b3e3790f842d308eed2e4ec411ed7533bd88dadddedc490b37d79074d28fecafbf91f3dece19ea03763b0b040b89d9d755438348b544d6e0c66840e134f5
-
SSDEEP
384:bDe0nSkjZ7eAEKN229lkRzdq2qE8A7obV6WaJboMSLAQMzvSIozDX3PX2d4e7:bDZD7b229xKo1E0pAN0f2dP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58bdabb4fd691bef1354503ca094ca84
Files
-
58bdabb4fd691bef1354503ca094ca84.exe windows:4 windows x86 arch:x86
4dfcf947fa85f6dba1305f0c7cf4b7d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
CreateToolhelp32Snapshot
GetSystemDirectoryA
Sleep
OpenProcess
ReadFile
CreateFileA
Process32First
Process32Next
GetCurrentProcess
GetLastError
CloseHandle
VirtualAllocEx
OutputDebugStringA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
SetFilePointer
GetLocaleInfoA
GetCPInfo
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStringTypeA
GetStringTypeW
LoadLibraryA
GetACP
GetOEMCP
HeapReAlloc
RtlUnwind
InterlockedExchange
SetStdHandle
FlushFileBuffers
TerminateProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
advapi32
RegisterServiceCtrlHandlerA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
StartServiceCtrlDispatcherA
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE