Static task
static1
Behavioral task
behavioral1
Sample
657a23666e9904bc8239bd2a32b5320c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
657a23666e9904bc8239bd2a32b5320c.exe
Resource
win10v2004-20231215-en
General
-
Target
657a23666e9904bc8239bd2a32b5320c
-
Size
36KB
-
MD5
657a23666e9904bc8239bd2a32b5320c
-
SHA1
4273dcc987fc7f1144b5602be7bb28e11a537535
-
SHA256
069a8893b15bdf933fe3376f2d604b30322c07b4465fa7a343f6dbf2fc9062dd
-
SHA512
216b71bc3a4a9e4e69852096d4dfdf03628610983f0746af3c7a046d40ece7b7c5de8fa3b527bef42fcb4d351b0ef4c68f94eee71897cf7604da744cf4844552
-
SSDEEP
768:Lra3FyZC1yp9P1Cm793tOIJ7Ihyg3WSBB9VGMEt:Lrl2iCCb9Zgmi9VGMEt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 657a23666e9904bc8239bd2a32b5320c
Files
-
657a23666e9904bc8239bd2a32b5320c.exe windows:4 windows x86 arch:x86
c0c0d2a81d347cc51c4c4d2ed3b155db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualAllocEx
WriteProcessMemory
SetThreadContext
ResumeThread
TerminateProcess
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
HeapAlloc
HeapFree
HeapReAlloc
ntdll
ZwUnmapViewOfSection
Sections
.code Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 41B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE