Static task
static1
Behavioral task
behavioral1
Sample
95dcec9079d161d5c76008cfaeed4490.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95dcec9079d161d5c76008cfaeed4490.exe
Resource
win10v2004-20231222-en
General
-
Target
95dcec9079d161d5c76008cfaeed4490
-
Size
220KB
-
MD5
95dcec9079d161d5c76008cfaeed4490
-
SHA1
253096e2693325092dbc95a48081e6f09ab03815
-
SHA256
e2f884310312e8b50916d4d34e254933703cd85eda88b0aa4696f7db311e81a5
-
SHA512
b3cabf34544aed708f005ff0586aa9872be5ddf472393137c1919891d2078ab0252726a3203985338a6e4d954cd0245927675b02263a392f2100026e58945ae8
-
SSDEEP
3072:bDM+88OueX6ca6my9UXuA+y1XavUvQoACv+bi:bf88Oudca6D9U+A31XavIss
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95dcec9079d161d5c76008cfaeed4490
Files
-
95dcec9079d161d5c76008cfaeed4490.exe windows:4 windows x86 arch:x86
77a515376aafac0f6d55148b46fc10c8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
GlobalAlloc
OpenProcess
CloseHandle
SetThreadContext
SuspendThread
Sleep
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetThreadContext
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
GlobalFree
FindFirstFileA
GetWindowsDirectoryA
SetFileAttributesA
TerminateProcess
CreateProcessA
SetCurrentDirectoryA
DeleteFileA
GetModuleFileNameA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
CreateFileA
GetModuleHandleA
GetProcAddress
ExitProcess
GetVersion
GetStartupInfoA
GetCommandLineA
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetLastError
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
GetStringTypeA
GetStringTypeW
HeapAlloc
HeapReAlloc
VirtualAlloc
SetStdHandle
FlushFileBuffers
ReadFile
SetEndOfFile
user32
MessageBoxA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ