Static task
static1
Behavioral task
behavioral1
Sample
7948f60b437edd0afbe57bf5d190bf59.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7948f60b437edd0afbe57bf5d190bf59.exe
Resource
win10v2004-20231222-en
General
-
Target
7948f60b437edd0afbe57bf5d190bf59
-
Size
7KB
-
MD5
7948f60b437edd0afbe57bf5d190bf59
-
SHA1
c585daa661888bd51ec3b3a73b91e1373869667b
-
SHA256
3e046f658335afe90c71218242e924ed3e69bd7d21053aeaf9e8792d68fa5c00
-
SHA512
62cb0d23bb8e319524cd9bf91c9a187cce288b5d73a638801ff3108d05b9fd89b743e8540afc7f1ad41e35ed5dd0a42ff519c799092d74172a59ac5672bd2406
-
SSDEEP
192:yFvstFPGGHUM8KjD7aJOTEGBsrgodv/v:yl5bKvodXv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7948f60b437edd0afbe57bf5d190bf59
Files
-
7948f60b437edd0afbe57bf5d190bf59.exe windows:4 windows x86 arch:x86
0f124d43eb63194b95b481f5aede7adf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleFileNameA
SetEvent
CloseHandle
lstrcpyA
GetModuleHandleA
lstrcatA
VirtualQuery
InterlockedExchange
RtlUnwind
ExitProcess
CreateEventA
LoadLibraryA
CompareStringA
Process32First
CreateToolhelp32Snapshot
FreeLibrary
user32
GetTopWindow
BeginPaint
IsWindow
advapi32
RegCloseKey
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE