Static task
static1
Behavioral task
behavioral1
Sample
670f134f4cdc855e22656f423d80859b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
670f134f4cdc855e22656f423d80859b.exe
Resource
win10v2004-20231215-en
General
-
Target
670f134f4cdc855e22656f423d80859b
-
Size
461KB
-
MD5
670f134f4cdc855e22656f423d80859b
-
SHA1
6a4d83b2b5caf2874caa45c0a6b8824fc8a22e38
-
SHA256
e2dff16c4dcf4c214722d42d219ca0b980019ff7bb43a73780952e01d238c994
-
SHA512
68cace1747831810a01966b84af97c240fcbd006f4195352df5840500be75f87ddbfdb1750a93daa3ab7269fad8becabf4bfe6d1808b5d338e37618e07b10882
-
SSDEEP
6144:ihgXNII4ns1irrBWP6Mjx64oajkZw8d6NUAI2hsuTZVB5Zvb9DqSjR5mPK0PEQG9:JdIIOssIPAzZw8wI2VVBTvBWaEPwR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 670f134f4cdc855e22656f423d80859b
Files
-
670f134f4cdc855e22656f423d80859b.exe windows:4 windows x86 arch:x86
b7ac57d17c948321cb90d09db6cde9fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LocalAlloc
GetModuleFileNameA
GetModuleHandleA
ContinueDebugEvent
IsDebuggerPresent
WaitForDebugEvent
CheckRemoteDebuggerPresent
lstrcmpA
LocalFree
lstrlenA
lstrcpyA
GetCurrentProcess
CreateProcessA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
Sections
.f0Gx Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 452KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ