Static task
static1
Behavioral task
behavioral1
Sample
9635cd1a1b09fd4ac0b9f8a2e4a1488e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9635cd1a1b09fd4ac0b9f8a2e4a1488e.exe
Resource
win10v2004-20231222-en
General
-
Target
9635cd1a1b09fd4ac0b9f8a2e4a1488e
-
Size
177KB
-
MD5
9635cd1a1b09fd4ac0b9f8a2e4a1488e
-
SHA1
1156c4337fc9dc5f2dcd26947bb0140c240c5f2c
-
SHA256
5dc8dfdb2fe2b343e886b42620c6ece84d18c168d34b862f1dc7470926d86abb
-
SHA512
120289b97339214ec9c330ec3002baf80fe19960115e6a427ef599611762ea1a2dff8379393875219614a3b7e9a44c7c149958158040ec55a7a73e490ffac0ff
-
SSDEEP
3072:wMkX+GYY92bGUHj35Qpqz4cTRV+kFwRUwleXHwwf2RKnS/Af1:wvt2ScNcUNVVORUwSCR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9635cd1a1b09fd4ac0b9f8a2e4a1488e
Files
-
9635cd1a1b09fd4ac0b9f8a2e4a1488e.exe windows:1 windows x86 arch:x86
e01b1b0cf1419d649d165dcf8cfb0ab8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
FlushFileBuffers
FatalAppExitA
VirtualAlloc
OpenSemaphoreA
SizeofResource
IsBadStringPtrA
EnumResourceTypesA
GetDefaultCommConfigA
CopyFileExA
FindNextFileA
SetConsolePalette
LocalSize
CreateFileMappingA
GetFileAttributesExA
SetConsoleCursorMode
GlobalHandle
GetThreadLocale
WriteProcessMemory
HeapQueryInformation
ntdll
RtlGetLastWin32Error
advapi32
RegQueryInfoKeyW
AddAce
Sections
.text Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ