Static task
static1
Behavioral task
behavioral1
Sample
96ceb78edb1356545d3759b428283e23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96ceb78edb1356545d3759b428283e23.exe
Resource
win10v2004-20231222-en
General
-
Target
96ceb78edb1356545d3759b428283e23
-
Size
20KB
-
MD5
96ceb78edb1356545d3759b428283e23
-
SHA1
254c4e97483c1ef38c3e6937904158e808fdd547
-
SHA256
429d64b9f304227186284e32e2f10db030d0ed3d286390360d6b32795c05642e
-
SHA512
bcdec2961cc7b73ae6adf810a1c60a2000ca51adf2fb65772bc627e446f082bd1fe3653589c01af51b03190b70504ee01eb5add1986c8696cd4d82a6f6d37a63
-
SSDEEP
384:6McdHpMtM/TnxfHPkr9udWnAuyXce84A:TcJTLndXdWnAuY/8V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96ceb78edb1356545d3759b428283e23
Files
-
96ceb78edb1356545d3759b428283e23.exe windows:4 windows x86 arch:x86
48931d9f776f300043707307c0e9f7ee
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleActiveScreenBuffer
CopyFileA
VirtualFree
OpenMutexA
LockFileEx
RtlUnwind
SetSystemPowerState
GetCommandLineA
ExitProcess
GetStartupInfoA
LocalFree
CompareFileTime
GetStringTypeA
GetSystemDefaultLangID
VerifyConsoleIoHandle
GetConsoleAliasesA
FindFirstVolumeMountPointA
InitAtomTable
FlushViewOfFile
PeekConsoleInputA
ExitThread
DeleteCriticalSection
GetNumberOfConsoleMouseButtons
GetProcAddress
GetNamedPipeHandleStateA
GetWriteWatch
Sections
ATSEC0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ATSEC1 Size: - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ATSEC2 Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ