Static task
static1
Behavioral task
behavioral1
Sample
85df7a07aaaa8dbd9ebce010b340277c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85df7a07aaaa8dbd9ebce010b340277c.exe
Resource
win10v2004-20231222-en
General
-
Target
85df7a07aaaa8dbd9ebce010b340277c
-
Size
12KB
-
MD5
85df7a07aaaa8dbd9ebce010b340277c
-
SHA1
e2e234952d7ba8ae9f9e05c1b86b8d52eaa8cd02
-
SHA256
709c576c3daa0f0445770df925473dddae3020eecdcee6fc6385ec7d1dd66dc5
-
SHA512
d61653219a7d19c071eae826e7c8099038f91d671612261e36c10130f9d6c55047ce5140acb706000698e4f777a98a6549eb921568f2f095affd28dc668226e0
-
SSDEEP
192:6wr60GgN4of6ya+Ljz2qMlMNeTL3TNeT4+vD:nrv446GLn2vMNeLNek+vD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 85df7a07aaaa8dbd9ebce010b340277c
Files
-
85df7a07aaaa8dbd9ebce010b340277c.exe windows:4 windows x86 arch:x86
dac4bf2eff79497aa101736c505cb70f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
FindClose
GetDiskFreeSpaceA
TlsGetValue
SetEvent
SearchPathA
GetTickCount
FindResourceExA
CreateThread
Sleep
VirtualProtect
CloseHandle
GetCalendarInfoA
GetModuleHandleA
ReleaseMutex
FindVolumeClose
ExitProcess
DeleteCriticalSection
lstrlenA
GetLastError
user32
EnableWindow
GetMessageA
CopyImage
DispatchMessageA
DragDetect
GetUpdateRect
GetScrollBarInfo
CreateMenu
CreateWindowExA
EndDialog
CloseWindow
DialogBoxParamA
IsIconic
GetKeyState
msdmo
DMOGetName
DMOEnum
DMOUnregister
DMOGetTypes
DMORegister
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE