Static task
static1
Behavioral task
behavioral1
Sample
7303587b4c0dddfe7f9dd3e452cdc004.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7303587b4c0dddfe7f9dd3e452cdc004.exe
Resource
win10v2004-20231215-en
General
-
Target
7303587b4c0dddfe7f9dd3e452cdc004
-
Size
174KB
-
MD5
7303587b4c0dddfe7f9dd3e452cdc004
-
SHA1
f59d471d23add1cda4d273f7fe809e4966e05a3f
-
SHA256
71f8d09edb2c281682f43f63adf05a0bc7d14b8368fc2bd7bdd2708fb48602b1
-
SHA512
60a5ade4b5bccb4720836bff26263fdde693493d8211de9b83e4f49ea69acf5ab3d10c4c005fb72e697ca6f813c06fe5a8952baacf9b2586eedffa753fb8e03f
-
SSDEEP
1536:b4xlFP9UjHtK2fYkcSkRPQwRg6aHd3m6Nl7HIE:Uxll9b2fI4ogHd3mE9D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7303587b4c0dddfe7f9dd3e452cdc004
Files
-
7303587b4c0dddfe7f9dd3e452cdc004.exe windows:4 windows x86 arch:x86
d5e7b33678f977f3b75f34d5a07e92ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
RtlUnwind
lstrlenA
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
WaitForSingleObject
VirtualFree
VirtualAlloc
Sleep
RtlZeroMemory
GetThreadContext
GetTickCount
CreateThread
LCMapStringW
CloseHandle
GetProcAddress
LoadLibraryA
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
CreateFileA
OpenProcess
lstrcatA
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
CopyFileA
TerminateProcess
SetThreadContext
WriteProcessMemory
VirtualAllocEx
FreeLibrary
GetModuleHandleA
lstrcmpiA
ReadProcessMemory
GetStringTypeW
wsock32
socket
send
select
recv
ioctlsocket
htons
gethostbyname
connect
closesocket
WSAStartup
WSACleanup
advapi32
RegCreateKeyA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE