Static task
static1
Behavioral task
behavioral1
Sample
887c610d53f437f8097d08e2486c53e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
887c610d53f437f8097d08e2486c53e4.exe
Resource
win10v2004-20231215-en
General
-
Target
887c610d53f437f8097d08e2486c53e4
-
Size
19KB
-
MD5
887c610d53f437f8097d08e2486c53e4
-
SHA1
cc02ad7b36562dc2d6d5b139635571cd3b809fe0
-
SHA256
c6d350f0826f57d769899954a0da5d325ec409d388b8045c1ab74475173b1021
-
SHA512
9a5c5b57be7be9914234d3a01131665281a366d399b8013bc960403dc5a37eca7ebe9a6d49988b7f21b79373d270687056d0834184e536a3918aa29c32415a24
-
SSDEEP
384:yKnkuZVKHRTbJwwZAvVds5jK3nyVzLWRcCQv38KthulnfWjvOeo:JkSKHhGDs5InypLWRcPv3Btsln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 887c610d53f437f8097d08e2486c53e4
Files
-
887c610d53f437f8097d08e2486c53e4.exe windows:4 windows x86 arch:x86
ddc91b758b2f5b1e53249590513dc74f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetFileAttributesA
GetTempPathA
lstrcpyA
CloseHandle
lstrcatA
WaitForSingleObject
GetProcessHeap
WriteFile
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
LoadLibraryA
RtlUnwind
ExitProcess
GetModuleHandleA
CreateEventA
SetEvent
CreateThread
GetVersionExA
ExitThread
GetProcAddress
user32
wsprintfA
DestroyWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
ShowWindow
CreateWindowExA
SetThreadDesktop
CreateDesktopA
CharToOemA
GetTopWindow
PeekMessageA
advapi32
RegCloseKey
RegCreateKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ