Static task
static1
Behavioral task
behavioral1
Sample
962341edb4d5853b735ea193b7b13bc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
962341edb4d5853b735ea193b7b13bc4.exe
Resource
win10v2004-20231222-en
General
-
Target
962341edb4d5853b735ea193b7b13bc4
-
Size
14KB
-
MD5
962341edb4d5853b735ea193b7b13bc4
-
SHA1
0a6fef1c0f0c3c06b358217f0f4ebe43ce38aed6
-
SHA256
e8132352b804135f7387daa1aa2fc0894d9e57cd6058b30ba7acd52d0963e80a
-
SHA512
d1ef0574f3b458a293a4e40de6000d831ca97668b7da8c13edd541a9fe32225a8596b74ca06d5865b2667af7007867508a9dfc656f7292d7826128c959d82d1f
-
SSDEEP
192:/LvOAfuuLaIT30044loGmIjSHPTIRKfKuL/3Ls0k2ohtZxevbeu:/rPRk044lotIjSHPTIyKuL/3A2sEvbX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 962341edb4d5853b735ea193b7b13bc4
Files
-
962341edb4d5853b735ea193b7b13bc4.exe windows:5 windows x86 arch:x86
2cb40f7956685758def41c4a204f65ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetStartupInfoW
GetStartupInfoA
ConvertThreadToFiber
CreateFileW
ExitProcess
MapUserPhysicalPagesScatter
ReadConsoleOutputAttribute
ReadFileEx
WaitForMultipleObjects
FormatMessageW
GetModuleHandleW
msvcrt
memset
advapi32
RegOpenKeyA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ