Static task
static1
Behavioral task
behavioral1
Sample
719dfc8bcc0e172f5835d8cae7f97698.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
719dfc8bcc0e172f5835d8cae7f97698.exe
Resource
win10v2004-20231222-en
General
-
Target
719dfc8bcc0e172f5835d8cae7f97698
-
Size
33KB
-
MD5
719dfc8bcc0e172f5835d8cae7f97698
-
SHA1
87aedae2d1d5cf25c12320bfa31a7a089f4bf175
-
SHA256
5ae66fc7e6c2c79329b2b7e09ab5430f47fa458ffa21b5be5104328840fc0a95
-
SHA512
99923802c3925912393692942d33959f93d3610b5cc24bac9a661603e87dfb941c223cc3de15c1f40cfb90c185e5b003d1cc109a7c0e6a7aee3b0733dc62ee48
-
SSDEEP
768:bn3SBAdJ22b2xpj3wnyaX6+RjUuQdTn9cHdx/s6he9Lo:zSBAbp28LbdRu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 719dfc8bcc0e172f5835d8cae7f97698
Files
-
719dfc8bcc0e172f5835d8cae7f97698.exe windows:4 windows x86 arch:x86
dd211e2c83c9b4642c33fed8c81b90d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
strncmp
strchr
sprintf
_itoa
_chkstk
atoi
strstr
strncpy
memset
RtlRandom
kernel32
lstrcpynA
VirtualFree
VirtualAlloc
OpenProcess
SetCurrentDirectoryA
GetTimeZoneInformation
GetCurrentProcessId
GetWindowsDirectoryA
GetSystemDirectoryA
ReadFile
Sleep
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
GetProcessHeap
GetSystemTime
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetLastError
GetLocalTime
GetCurrentDirectoryA
psapi
GetModuleFileNameExA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE