Static task
static1
Behavioral task
behavioral1
Sample
97b77a04af1961d7b93bfebcf2edbd34.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97b77a04af1961d7b93bfebcf2edbd34.exe
Resource
win10v2004-20231222-en
General
-
Target
97b77a04af1961d7b93bfebcf2edbd34
-
Size
2KB
-
MD5
97b77a04af1961d7b93bfebcf2edbd34
-
SHA1
aabb41780a987046cb2c2c509a0316dbd447d5da
-
SHA256
961ff7365d3881d18842f49d124734a33cdc27fd4b9f4b295b20342013b92c0c
-
SHA512
736d6452e953683216183cafbd62e8905e6313095a502f1397e5764c054eb50d384832e5b4cb5ed09c1bc0d3b00aae27281b4cdef4a910a74d01c60d91850891
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97b77a04af1961d7b93bfebcf2edbd34
Files
-
97b77a04af1961d7b93bfebcf2edbd34.exe windows:4 windows x86 arch:x86
c7828b99fa0490ca111a9c0cf06f2553
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
GetWindowThreadProcessId
kernel32
OpenProcess
GetModuleHandleA
VirtualAllocEx
ExitProcess
GetProcAddress
LoadLibraryA
CloseHandle
WriteProcessMemory
GetCurrentProcess
Sleep
WinExec
GetWindowsDirectoryA
VirtualProtectEx
msvcrt
_except_handler3
strncpy
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ