Static task
static1
Behavioral task
behavioral1
Sample
64843abba9a92ddca3ec41be2ccfde4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
64843abba9a92ddca3ec41be2ccfde4f.exe
Resource
win10v2004-20231215-en
General
-
Target
64843abba9a92ddca3ec41be2ccfde4f
-
Size
216KB
-
MD5
64843abba9a92ddca3ec41be2ccfde4f
-
SHA1
de2b118d7c3e10b3d9bb25c9d30314026d3ecb4d
-
SHA256
dc6524f16e198e63be7641aecd9494c85a293cfa04ab44c1ca8fa4eb90379a62
-
SHA512
8ae16b15e4082579b545bd13eadbf1e62eef6dfe211cbb40202ff2b6a8b18754ee57fdf9972114e35705da7e53315c6c70d65823ceee9001f4d451009cb280c8
-
SSDEEP
3072:HtDbq7JbsjCJTKDQ6iLpUSmvCPAosiQNoEtUJGSJOlo3W:H5bq72jCx+Q6opU5qPAJiwoEa+6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64843abba9a92ddca3ec41be2ccfde4f
Files
-
64843abba9a92ddca3ec41be2ccfde4f.exe windows:4 windows x86 arch:x86
12142ca43448c59c0f2738ad3a0aabc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
FileTimeToDosDateTime
GetFileTime
ReadFile
SetConsoleMode
GetConsoleMode
LeaveCriticalSection
HeapFree
GetProcessHeap
EnterCriticalSection
lstrcpynA
HeapAlloc
lstrcmpiA
lstrlenA
GetCurrentProcess
InitializeCriticalSection
ReleaseMutex
WaitForSingleObject
InterlockedExchange
CreateMutexA
SetConsoleCtrlHandler
ExitProcess
TerminateProcess
GetCommandLineA
UnhandledExceptionFilter
WideCharToMultiByte
HeapDestroy
HeapCreate
VirtualFree
SetVolumeLabelA
GetFileAttributesA
WriteFile
MultiByteToWideChar
GetTimeZoneInformation
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
GetCPInfo
CompareStringA
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
SetStdHandle
GetProcAddress
LoadLibraryA
SetEndOfFile
FindClose
FindFirstFileA
FindNextFileA
FileTimeToLocalFileTime
GetFullPathNameA
GetVolumeInformationA
SetFileAttributesA
CreateFileA
GetLastError
GetVersion
SetFileTime
CloseHandle
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetCurrentDirectoryA
FileTimeToSystemTime
DeleteFileA
CreateDirectoryA
advapi32
GetSecurityDescriptorControl
OpenProcessToken
AdjustTokenPrivileges
GetKernelObjectSecurity
LookupPrivilegeValueA
IsValidSecurityDescriptor
GetSecurityDescriptorDacl
SetKernelObjectSecurity
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
IsValidAcl
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
IsValidSid
user32
CharToOemA
OemToCharA
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE