Static task
static1
Behavioral task
behavioral1
Sample
97a7c93174330fcafdfbf235aaad2d6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97a7c93174330fcafdfbf235aaad2d6a.exe
Resource
win10v2004-20231215-en
General
-
Target
97a7c93174330fcafdfbf235aaad2d6a.bin
-
Size
68KB
-
MD5
97a7c93174330fcafdfbf235aaad2d6a
-
SHA1
a4cc064cb016290bbe6ffdf54e94efc330fcb314
-
SHA256
5406db3d5f7fc3176ad1f037e354e79476d2ddace36fe928d08a9692f113b2c0
-
SHA512
83e5b48e182a0be7e30c79c9e7ce237f081299f6a5c7b5c310f2530ef6cdfbf1a737887ca29991cb30dad59b0d27b2ca425aee65dd487c418b7b7e4fbf666720
-
SSDEEP
1536:zG1xbBriWN2cqagIj4xIY0fcOLZrilV0PUh55U:z6bBn2c3j4GYbqrUhhz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97a7c93174330fcafdfbf235aaad2d6a.bin
Files
-
97a7c93174330fcafdfbf235aaad2d6a.bin.exe windows:4 windows x86 arch:x86
30df7e07c0a8f2e0452db50701326ada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CloseHandle
DeviceIoControl
GetSystemDirectoryA
GetVolumeInformationA
GetTempPathA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetVersionExA
CreateProcessA
user32
wsprintfA
shell32
SHChangeNotify
ShellExecuteExA
msvcrt
??3@YAXPAX@Z
__CxxFrameHandler
strncat
atoi
_except_handler3
sprintf
strncpy
_strdup
rand
_itoa
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Xlen@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE