Static task
static1
Behavioral task
behavioral1
Sample
86dff5e7fbfa9b6b962f776d305f3909.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
86dff5e7fbfa9b6b962f776d305f3909.exe
Resource
win10v2004-20231215-en
General
-
Target
86dff5e7fbfa9b6b962f776d305f3909
-
Size
3KB
-
MD5
86dff5e7fbfa9b6b962f776d305f3909
-
SHA1
f6b596e6e9ffa6aaafc871deda1bf927e8cfef4f
-
SHA256
ffb0d5a3a42cde073f1d154ccf9e1b27e79806e76f008c20c568b3ee49631019
-
SHA512
9c660750091c1f4045629d3e211eb728985d7aacd33b94c650b1b9bbcdaffb7d02132e8ee728d5354d4fa7ea3f4e36d5826479450496fedf9bbcddd27f36a22a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86dff5e7fbfa9b6b962f776d305f3909
Files
-
86dff5e7fbfa9b6b962f776d305f3909.exe windows:4 windows x86 arch:x86
e664464ddab7c0eb6a3977b4b25f114c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
wsprintfA
kernel32
CreateProcessA
CreateRemoteThread
ExitProcess
GetProcAddress
LoadLibraryA
VirtualAllocEx
WriteProcessMemory
advapi32
RegSetValueExA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE