Static task
static1
Behavioral task
behavioral1
Sample
96f994a1a15f477fc1eab23066dc2315.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
96f994a1a15f477fc1eab23066dc2315.exe
Resource
win10v2004-20231215-en
General
-
Target
96f994a1a15f477fc1eab23066dc2315
-
Size
24KB
-
MD5
96f994a1a15f477fc1eab23066dc2315
-
SHA1
da3b50b9106ffa49b65af469f934349c76882fc7
-
SHA256
9873433df84391be0afd08cc0854ef704496bf9ef765bdfc4848f273b6ef7a78
-
SHA512
ae7ee0dd6dc9c371e273d557176d0c701eb4e349cceec492b2cd3fd2447b44229b363734926b324a27cceffdaf72fe1f581aeacc78aa5cdecd2c1cd367f8401b
-
SSDEEP
384:zrXJ/wnDo6zLDGGezpA9FBBM7bnFLABrRRvXQqpe1Hv:z16M7DFwrnXZped
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96f994a1a15f477fc1eab23066dc2315
Files
-
96f994a1a15f477fc1eab23066dc2315.exe windows:4 windows x86 arch:x86
19fabeebafaecb3abb0d5706fd9a7e0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
OpenEventA
SetEvent
Sleep
lstrcatA
DeleteFileA
GetCurrentProcess
GetProcAddress
CloseHandle
PulseEvent
ResetEvent
WriteFile
ReadFile
GetCommandLineA
GetModuleHandleW
FindNextFileW
ExitProcess
GetModuleHandleA
OpenProcess
GetShortPathNameA
GetEnvironmentVariableA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcpyA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
user32
CharUpperA
MessageBoxA
ExitWindowsEx
wsprintfA
advapi32
RegDeleteValueA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteExA
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE