Static task
static1
Behavioral task
behavioral1
Sample
711809a45ecebf1601f6acdeaf6dd421.exe
Resource
win7-20231215-en
General
-
Target
711809a45ecebf1601f6acdeaf6dd421
-
Size
285KB
-
MD5
711809a45ecebf1601f6acdeaf6dd421
-
SHA1
579da39b0fc2412517dd060d055087916e7318de
-
SHA256
7bf149754d4bb3f765b54bb451ab335d302f6999e37cd85966b05f7a82105ad1
-
SHA512
1c28733de3971f668cfcf5f1090ecf16cbf4e9ca5ecfc9477a9560b2fa5c95961dc8a4cb80694e2fad7fedced81c08cd86d4fb078f8e7e42647b0d9167eefd3c
-
SSDEEP
6144:rn+kCFgfP+mRQlNvo5yeKNpUOwz+6Fp8qmmWyEtLrO:j+kCF6WmqlNvokbyOa+6w7ta
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 711809a45ecebf1601f6acdeaf6dd421
Files
-
711809a45ecebf1601f6acdeaf6dd421.exe windows:4 windows x86 arch:x86
40da8c61f67fa1773297671324583f6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
realloc
free
strcmp
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
VirtualAlloc
VirtualFree
VirtualProtect
LoadLibraryA
GetProcAddress
IsBadReadPtr
GetProcessHeap
HeapAlloc
FreeLibrary
HeapFree
InitializeCriticalSection
GetModuleFileNameA
Sleep
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
CloseHandle
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
Sections
.code Size: 512B - Virtual size: 465B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ