Static task
static1
Behavioral task
behavioral1
Sample
9986e04f6c1e4e6431a5a73b42c5e0fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9986e04f6c1e4e6431a5a73b42c5e0fe.exe
Resource
win10v2004-20231215-en
General
-
Target
9986e04f6c1e4e6431a5a73b42c5e0fe
-
Size
20KB
-
MD5
9986e04f6c1e4e6431a5a73b42c5e0fe
-
SHA1
d49458b41982f82c46e713b8df836078b57a9294
-
SHA256
163011c6e3b280c3a57e9bb0d7461fae8c871997fa17a23af8412bfe2fd9f1c2
-
SHA512
8dbe55bff40af5655338a0afa5622a4bb8c666c80f24fa9d4e5c78a299d39085c9a12edf5a0d46a5367234d4b2d895448d3ff8b5d9aa9a27b98080c1e1532760
-
SSDEEP
96:IFJnd97Z3iqVvoOm1DTdn3FVllnBSEnkJ3SggaoMrvhrygTdf9:IPndvSqxo5NTVpbEg78r/pl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9986e04f6c1e4e6431a5a73b42c5e0fe
Files
-
9986e04f6c1e4e6431a5a73b42c5e0fe.exe windows:4 windows x86 arch:x86
5ce96ab0e6c09edc89ba9348cf037069
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetTickCount
HeapAlloc
HeapReAlloc
IsBadStringPtrW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
exit
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcpy
strcspn
strlen
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 160B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE