Static task
static1
Behavioral task
behavioral1
Sample
9aac7d22e76e07b4ff9e7a5548b4c7d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9aac7d22e76e07b4ff9e7a5548b4c7d7.exe
Resource
win10v2004-20231222-en
General
-
Target
9aac7d22e76e07b4ff9e7a5548b4c7d7
-
Size
216KB
-
MD5
9aac7d22e76e07b4ff9e7a5548b4c7d7
-
SHA1
8059a87ebf85e28973f84e624c1ab877f510053e
-
SHA256
43062d6b7c764846264ba202dd64a4c16bcc61d3f6b7c438c3ec2a157de2a266
-
SHA512
54819b3a0f678adda05505d1792f09d27082ec55aedf5ffc6d4436ec0405ed3a818ffddd0e55f9da3e779066c94ef6acccc2439659f1a034d84a78ddcbe09f2d
-
SSDEEP
3072:mVhgQadS5IrngF5hA/sjt49EvGXyZtl0G0VaesWRlPE8eq:yeOGkJtaEwWlDuM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9aac7d22e76e07b4ff9e7a5548b4c7d7
Files
-
9aac7d22e76e07b4ff9e7a5548b4c7d7.exe windows:4 windows x86 arch:x86
f928c59b915a02a88eac89d64fbc1fff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriorityBoost
GetFileAttributesExA
GlobalDeleteAtom
GetCurrentProcess
FindNextVolumeMountPointW
_hwrite
FindFirstChangeNotificationA
GetCPInfoExA
GetFileTime
GetFileAttributesExA
SetInformationJobObject
WriteConsoleInputA
RaiseException
GetExitCodeThread
ExitProcess
GetSystemDefaultUILanguage
GetFileSizeEx
SetMailslotInfo
GetStringTypeA
GetFileInformationByHandle
ConnectNamedPipe
OpenSemaphoreA
EnumTimeFormatsA
GetCurrentProcess
GetProcessIoCounters
SetEvent
CopyFileExW
SetWaitableTimer
VerifyVersionInfoA
WriteConsoleOutputCharacterA
VirtualAllocEx
VirtualAlloc
gdi32
SetViewportOrgEx
shell32
SHGetSpecialFolderPathA
winmm
timeGetTime
timeEndPeriod
Sections
.itext Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 204KB - Virtual size: 484KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ