Static task
static1
Behavioral task
behavioral1
Sample
97f2025da3778b747d9ab48aa9d94438.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97f2025da3778b747d9ab48aa9d94438.exe
Resource
win10v2004-20231215-en
General
-
Target
97f2025da3778b747d9ab48aa9d94438
-
Size
32KB
-
MD5
97f2025da3778b747d9ab48aa9d94438
-
SHA1
e5a801664f1cfee3af66e638cfce1b03d4fd175f
-
SHA256
eaf803d035b30ca09748b821563864e529b40db65847c97b1354a5ca20a5417f
-
SHA512
96e93f427e41cab047d760c0042de34200341be3c12e12aafd0bfda1b7384b51e54f6daf0fa7f6a2323c34dca974dddb13e8543db15dc901f9f1caac5f7054f7
-
SSDEEP
384:VCDJY7tbFeOSJS7V8Mqks3LobXcB1VXCYaOcNb:QUtpeOS876Tks3LgsJCYaOc5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97f2025da3778b747d9ab48aa9d94438
Files
-
97f2025da3778b747d9ab48aa9d94438.exe windows:4 windows x86 arch:x86
a1502bb7ab03ddc1e1d01d08ee1c4375
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
kernel32
GetCurrentProcessId
VirtualQuery
GetLastError
SetFilePointer
GetStdHandle
WriteFile
HeapFree
HeapAlloc
WideCharToMultiByte
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
SetStdHandle
VirtualFree
VirtualAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetModuleFileNameA
FlushFileBuffers
LoadLibraryA
CloseHandle
RtlUnwind
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE