Static task
static1
Behavioral task
behavioral1
Sample
9b4137f30943b1a0584b8bf86b64215c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b4137f30943b1a0584b8bf86b64215c.exe
Resource
win10v2004-20231215-en
General
-
Target
9b4137f30943b1a0584b8bf86b64215c
-
Size
2KB
-
MD5
9b4137f30943b1a0584b8bf86b64215c
-
SHA1
da256debc918133e1237cb5ed94101c7867732dd
-
SHA256
84802e0b9b7e9e31f45738b0a284f67684896a2eaaed18f5611ddd7dc2ef4cee
-
SHA512
419cad22c3dcded21517c3d5265e1f2a53bea792febb24d76d8fa6a41e31243fa7417ff8d8e9c5af118a6a001f6fc013c19f9d884a6f45db5088f43950fead26
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9b4137f30943b1a0584b8bf86b64215c
Files
-
9b4137f30943b1a0584b8bf86b64215c.exe windows:4 windows x86 arch:x86
31924eb18187059c49182c591494db71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
lstrlenA
OpenProcess
GetModuleHandleA
GetLastError
Process32Next
Process32First
CreateToolhelp32Snapshot
GetProcAddress
CreateRemoteThread
GetCurrentProcess
CloseHandle
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
shell32
StrCmpNIA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE