Static task
static1
Behavioral task
behavioral1
Sample
727bebc448286e2c22542a7a422722de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
727bebc448286e2c22542a7a422722de.exe
Resource
win10v2004-20231215-en
General
-
Target
727bebc448286e2c22542a7a422722de
-
Size
421KB
-
MD5
727bebc448286e2c22542a7a422722de
-
SHA1
80c50af07e228063d1ba1931fe26df66f903ac0b
-
SHA256
7d96a57793e87442191aab34ed4dc3cb2473cac78195d39045fdb04f53867b49
-
SHA512
73083bdf9e83aec396cfd2ab7ce672f422a6312fba99190991068fcdeb894064e8c0d58092b34742431c9e58f101ba100bbed2cab8a87db110973d68cb2c0f57
-
SSDEEP
12288:SszorbeVlBGFS7r9xg8HgbrGBNzSzrxwq:X0a4U7rvg8kONzSf7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 727bebc448286e2c22542a7a422722de
Files
-
727bebc448286e2c22542a7a422722de.exe windows:4 windows x86 arch:x86
2e0edc215c569349c418e61c9aa432b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
SetCursor
LoadCursorA
DispatchMessageA
PeekMessageA
wsprintfA
MessageBoxA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ