Static task
static1
Behavioral task
behavioral1
Sample
73e2f446dbcc2f98d0006400869c6d0d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73e2f446dbcc2f98d0006400869c6d0d.exe
Resource
win10v2004-20231222-en
General
-
Target
73e2f446dbcc2f98d0006400869c6d0d
-
Size
61KB
-
MD5
73e2f446dbcc2f98d0006400869c6d0d
-
SHA1
6a95764deeb4c14148964d19bd726e049cb9f23e
-
SHA256
e63fc3882a8c57cb55c08aa46a99395671c6e19a3dbbf83dff983a89cdb08040
-
SHA512
bc18f70375c2ebdf3936b73a23421e815196202f8a7735dd0f1eb3ffe24615e1355543c3090beced5e78b95bcebe4f0fd2a9b496a366c22bf03815325b0e693a
-
SSDEEP
768:XkCECIaazID6yLTCWzdMw41RcoKxXYZX1yLTCWzdMw41RcoKxXYZXO:X9ECXjTCwywoKxXNTCwywoKxXH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73e2f446dbcc2f98d0006400869c6d0d
Files
-
73e2f446dbcc2f98d0006400869c6d0d.exe windows:4 windows x86 arch:x86
d3a008f4f08a505723cdb1f0aaf0d3a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
GetProcAddress
LoadLibraryA
VirtualProtectEx
GetThreadContext
CreateProcessA
GetCommandLineA
SetThreadContext
ReadProcessMemory
ResumeThread
user32
GetDC
gdi32
SetTextColor
GetTextColor
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE