Static task
static1
Behavioral task
behavioral1
Sample
64a9fabb311330959670c40eb1a83576.exe
Resource
win7-20231215-en
General
-
Target
64a9fabb311330959670c40eb1a83576
-
Size
132KB
-
MD5
64a9fabb311330959670c40eb1a83576
-
SHA1
a9d39ddc64c6bbbe8aa885c1c8978023068faaa9
-
SHA256
8c556a92411b33a7e223b6433f4d083353cae8bf50f3472de1abe0e317878aaa
-
SHA512
46964216e19765242d3ef9352127200ff5bdf86c21c03b002348040caea98f161b285a0eba7632f0c851227cc0bcb5b401382ec51791d4c432994d83b6ad69e4
-
SSDEEP
1536:pNQU2jTh8tMCewBX79gMrauyJG9BzKek9lje37OWQ:LCfh83DX797eVA9pKdIrOW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64a9fabb311330959670c40eb1a83576
Files
-
64a9fabb311330959670c40eb1a83576.exe windows:4 windows x86 arch:x86
c578b3b79367204ad180362ab5b08ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAdjustment
ReleaseSemaphore
GetPriorityClass
GetEnvironmentStringsA
InterlockedExchange
GetDriveTypeA
GetExitCodeProcess
GetWriteWatch
GetThreadTimes
OpenSemaphoreA
DeleteTimerQueueEx
PulseEvent
SetLocalTime
GetVolumePathNameA
SetProcessWorkingSetSize
GlobalAddAtomA
GetFileAttributesA
SetConsoleDisplayMode
SetFilePointer
FindVolumeClose
SetConsoleTextAttribute
MoveFileA
GetSystemDefaultUILanguage
QueueUserAPC
SetFilePointer
HeapDestroy
VirtualAlloc
EndUpdateResourceA
ReadFileScatter
WaitForDebugEvent
FindFirstFileA
WaitCommEvent
DeviceIoControl
GetSystemTimes
wininet
HttpQueryInfoA
HttpOpenRequestA
InternetOpenW
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetSetOptionW
Sections
.data Size: - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 120KB - Virtual size: 345KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ