Static task
static1
Behavioral task
behavioral1
Sample
79c01e98634dfa368fb08393e5c48790.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
79c01e98634dfa368fb08393e5c48790.exe
Resource
win10v2004-20231215-en
General
-
Target
79c01e98634dfa368fb08393e5c48790
-
Size
17KB
-
MD5
79c01e98634dfa368fb08393e5c48790
-
SHA1
a8a087a4649b0b3b44bfcbeb9994da76425cdd50
-
SHA256
e70e4755689d917704af05fc37c6938f01419a44e49d3e12450924251543f1f9
-
SHA512
dda076f44e5e4e9977c11cc7ccbc45f13678befd6ddb4e08d4287df87cb2679745b15ea53a37f858e2d854fbd7779e68bba18b29b3b73e7d46c6aa123844f13c
-
SSDEEP
384:deum9fyZ6jRTXEXHdByB4S0RxqB++JuOx+GbY:TZ6jRjEXI4lgsb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79c01e98634dfa368fb08393e5c48790
Files
-
79c01e98634dfa368fb08393e5c48790.exe windows:4 windows x86 arch:x86
87732bc5541f4485640a20b4b1d23e26
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateProcessA
ExitProcess
FindResourceA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetThreadContext
GlobalAlloc
LoadResource
LockResource
ReadFile
ResumeThread
RtlZeroMemory
SetThreadContext
SizeofResource
Sleep
VirtualAllocEx
WriteFile
WriteProcessMemory
lstrlenA
user32
MessageBoxA
GetKeyState
GetCursorPos
ntdll
ZwUnmapViewOfSection
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE