Static task
static1
Behavioral task
behavioral1
Sample
96e400cee5d2397e03439db5fb83d0ad.exe
Resource
win7-20231215-en
General
-
Target
96e400cee5d2397e03439db5fb83d0ad
-
Size
200KB
-
MD5
96e400cee5d2397e03439db5fb83d0ad
-
SHA1
bdc08ab597473118ab3cacc6e023a2812375ac37
-
SHA256
43b2e8473356109160b24a2dd1f7fe32cf4417869ff7387d12e69e841abfb277
-
SHA512
b90e137dbbacba0b7380631979c133e8f6bba77e32f5711e55549a3acaba7bc6e83c2ec3990828faa486f1a4df569991d6b0b7b9741dee680ae26c51f98c3bc6
-
SSDEEP
3072:0q+xtoQV6BlVKhslcDdlA+TlPxuiVyUkzQBMNO9naY3C0Imt90trNNHzg74:N+pV61Khsm5xPx/sYMNgNSS9SNNHT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96e400cee5d2397e03439db5fb83d0ad
Files
-
96e400cee5d2397e03439db5fb83d0ad.exe windows:4 windows x86 arch:x86
e8c979bbe5066bca785c7b32913b89b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
MoveFileA
VirtualFree
LoadLibraryA
VirtualAlloc
VirtualProtect
GetProcAddress
GlobalLock
GetModuleHandleA
ReleaseMutex
IsBadWritePtr
GlobalAlloc
ResetEvent
VirtualAllocEx
TlsGetValue
GetLastError
CreateTimerQueue
LocalLock
VirtualLock
SuspendThread
user32
GetCursorPos
LoadCursorA
GetDC
GetDesktopWindow
LoadBitmapA
IsWindowVisible
IsIconic
SetTimer
ReleaseDC
DestroyWindow
InSendMessage
psapi
EnumProcessModules
GetModuleBaseNameA
msvfw32
ICInfo
DrawDibClose
DrawDibEnd
DrawDibOpen
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ