Static task
static1
Behavioral task
behavioral1
Sample
8059a81bbc38feeff30d60889eb84574.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8059a81bbc38feeff30d60889eb84574.exe
Resource
win10v2004-20231215-en
General
-
Target
8059a81bbc38feeff30d60889eb84574
-
Size
40KB
-
MD5
8059a81bbc38feeff30d60889eb84574
-
SHA1
f8d4729630a8a21f98ce7ecf92aaddbeced9345d
-
SHA256
bc921ad8f20170dc4415ba32a16a5d33b3aa38601f7c9a408d21590b8f67e690
-
SHA512
5c0c5e255d1713d0dd566c3145784f78c04e5fcb9c8245031949fc4e0b1b442399b4585c03d39ba82efc4befb04d2200d9045abfc845651526fb4228758b114f
-
SSDEEP
384:5XRR9UghgKXXizuAFXLvCxuCLZ44Ufg9N7J7d3yQcsn2+joHvz:5XrxqgS6AFbvCDy4Mg335HndjoP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8059a81bbc38feeff30d60889eb84574
Files
-
8059a81bbc38feeff30d60889eb84574.exe windows:4 windows x86 arch:x86
73f36b79801b0b94f58236ef3c3373d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
CreateToolhelp32Snapshot
lstrlenA
OpenProcess
GetSystemDirectoryA
Sleep
Process32First
Process32Next
VirtualAllocEx
GetCurrentProcess
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
GetStringTypeA
GetStringTypeW
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
GetLastError
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE