Static task
static1
Behavioral task
behavioral1
Sample
59f300fe7844d692dbc1df976c7182a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59f300fe7844d692dbc1df976c7182a8.exe
Resource
win10v2004-20231215-en
General
-
Target
59f300fe7844d692dbc1df976c7182a8
-
Size
276KB
-
MD5
59f300fe7844d692dbc1df976c7182a8
-
SHA1
fd232549b1629f223c24995573621eea7326535f
-
SHA256
6ff6e3182f579120761997ae576ae07c4bf8673cd7f13e871f8db60af2fc56b1
-
SHA512
cf1c56b669d8646134755c59d224c52f2d4213b02660cd8c586600d188e8ab1438c3727744471a1abafee5847677bc39888ef5c07c261c84e553ff4ae6e65db4
-
SSDEEP
6144:CQXVAgso8lNTSxb8ma9NLfPxqVoM8dLYHZPm:VFX2MBavLh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59f300fe7844d692dbc1df976c7182a8
Files
-
59f300fe7844d692dbc1df976c7182a8.exe windows:4 windows x86 arch:x86
826b35ea37e6a7b36ee4076acb4f26dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
ExitProcess
lstrcmpiA
Process32Next
FreeResource
lstrlenA
WriteFile
SizeofResource
SetFileTime
SystemTimeToFileTime
LoadResource
lstrcpyA
SetLastError
GetLastError
lstrcatA
GetSystemDirectoryA
ReadFile
SetFilePointer
GetModuleFileNameA
GetModuleHandleA
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexA
GetCommandLineA
SetFileAttributesA
Sleep
CreateThread
GetCurrentThreadId
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
msvcrt
memcpy
strchr
realloc
malloc
__CxxFrameHandler
_except_handler3
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memset
strlen
??2@YAPAXI@Z
strcat
strtok
strcpy
_strcmpi
_strrev
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 265KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ