Static task
static1
Behavioral task
behavioral1
Sample
984ee16ab72deb546dfa543067143774.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
984ee16ab72deb546dfa543067143774.exe
Resource
win10v2004-20231215-en
General
-
Target
984ee16ab72deb546dfa543067143774
-
Size
424KB
-
MD5
984ee16ab72deb546dfa543067143774
-
SHA1
909ff1c108d8d00b2b24f0d1ae1f0c7672b289f3
-
SHA256
e04253c14dc248d0f9879fd494bcf14c9d0d83441edb1f1c2c7f1bafefa4d6c5
-
SHA512
71eb1218656dd5372fce3602c0d152df476308692ef67d793c8c2ad0e59a02c5e89875ad2b400871d4572145ba8004843597cf1017da01a6a760865bf3c1fdbf
-
SSDEEP
12288:EEznNBwsV8DG+d0yS0C875TehNgNrAGEJlroJN:EEznNBwrdd0TkTVqGEJNqN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 984ee16ab72deb546dfa543067143774
Files
-
984ee16ab72deb546dfa543067143774.exe windows:4 windows x86 arch:x86
5f2df7257758bf2707e2911007001ebd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
CreateThread
LoadLibraryA
FindResourceA
GetModuleHandleA
LocalAlloc
LocalFree
GetCommandLineW
GlobalAlloc
GlobalFree
SetEvent
CreateProcessA
ExitProcess
GetTickCount
user32
GetClientRect
GetWindowRect
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
ShowWindow
UpdateWindow
CreateWindowExA
LoadBitmapA
SendMessageA
DestroyWindow
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 355KB - Virtual size: 628KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
. Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ