Static task
static1
Behavioral task
behavioral1
Sample
67700a5d15c26a2064947205556424ad.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67700a5d15c26a2064947205556424ad.exe
Resource
win10v2004-20231215-en
General
-
Target
67700a5d15c26a2064947205556424ad
-
Size
68KB
-
MD5
67700a5d15c26a2064947205556424ad
-
SHA1
1b6739b89df5425e9f2c0a3ce21a51ea62ff2013
-
SHA256
3bfecfc96b3324a783de8d1ead810d08059f80300a178e346e1dbc76168aba3c
-
SHA512
c324dbccc5cd3a7884457b2f27c18f03c3a484e7b96f615b8038d15009f47bd3799e4624e0a289bf93c5c2bc68de9af5e64f1ef694a452c9b08527bc86724386
-
SSDEEP
768:bZdIE6mCfH51bcgBH5T9Zztj7CzrWBTZXDuT+pxvPDgAiXKZC2p2ng4nGwcsz:9pQmg5Tf9u8TZXcCvfA2p2nNWsz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67700a5d15c26a2064947205556424ad
Files
-
67700a5d15c26a2064947205556424ad.exe windows:4 windows x86 arch:x86
52c976c8304837a726972b496e44078b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetModuleHandleA
GetProcAddress
OpenProcess
SetUnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
user32
MessageBoxA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 336B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE