Static task
static1
Behavioral task
behavioral1
Sample
8e03dea4eae765c0071899f1631606a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e03dea4eae765c0071899f1631606a4.exe
Resource
win10v2004-20231215-en
General
-
Target
8e03dea4eae765c0071899f1631606a4
-
Size
150KB
-
MD5
8e03dea4eae765c0071899f1631606a4
-
SHA1
12a14ab7c04a460c0e344c61f0beca4679d15f63
-
SHA256
79e8357b2eb49031b4ccbad6d723c4198d458352f44b55839751675f5ab6bd34
-
SHA512
d0f50c02f65dffb38e4f14c0413320db24142de9d83b1af55523599920a68dbfdcc48ebf44ae99b8592f2ef63cd4e4b6378a95898781b26dbd06b4171b382e96
-
SSDEEP
3072:1JKj5tv8VltKf3p+yAqYD4y/fQwIhLGBDrvdbBVo30:1MTf5+yAqY/XIBaDrFBqE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e03dea4eae765c0071899f1631606a4
Files
-
8e03dea4eae765c0071899f1631606a4.exe windows:1 windows x86 arch:x86
ec0fd12ddc31ab199fd4cc6c243cf6d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
kernel32
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
CreateFileA
ReadFile
RtlUnwind
SetFilePointer
WriteFile
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
crtdll
__GetMainArgs
exit
free
malloc
memset
raise
rand
signal
srand
strcat
strchr
strncpy
time
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 596B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 160B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 924B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE