Static task
static1
Behavioral task
behavioral1
Sample
9bda67abda7ff0c6a59f169f0711f833.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9bda67abda7ff0c6a59f169f0711f833.exe
Resource
win10v2004-20231215-en
General
-
Target
9bda67abda7ff0c6a59f169f0711f833
-
Size
158KB
-
MD5
9bda67abda7ff0c6a59f169f0711f833
-
SHA1
4217e15357120688e6492d8045a10578059e79db
-
SHA256
23b00a0a8e42e92f4298d6038ef18353a55f89b026d72be1fe3b98aa79fa79ad
-
SHA512
98ba9994c10e22fcb4deadf8d3fad660a049b141cab11071dc77fe050583f3609309658b74607025381b7199378f21e7ea43421b33ad287861881d6469c03375
-
SSDEEP
768:zd7+IzOyUJsb5tsp3YTsc+fHJeGEdTvkqCjwR3OER1u3OP0LpQAJvA:h7N6/+L5sc+fHJNW8qCjwjRSN0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9bda67abda7ff0c6a59f169f0711f833
Files
-
9bda67abda7ff0c6a59f169f0711f833.exe windows:1 windows x86 arch:x86
b69b12134b6e4d95cd38ec9b59678603
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LeaveCriticalSection
LeaveCriticalSection
CreateFileW
GetModuleHandleW
lstrlenW
CloseHandle
ReadFile
SetLastError
LocalFree
InterlockedDecrement
GetLastError
GetCurrentProcessId
GetModuleFileNameA
FreeLibrary
GetModuleFileNameA
HeapAlloc
LeaveCriticalSection
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateThread
GetStartupInfoA
GetTickCount
MultiByteToWideChar
LoadLibraryW
GetSystemTimeAsFileTime
SetLastError
WideCharToMultiByte
GetStartupInfoA
HeapReAlloc
GetProcessHeap
ExitProcess
HeapReAlloc
HeapAlloc
UnhandledExceptionFilter
QueryPerformanceCounter
ReadFile
MultiByteToWideChar
TerminateProcess
UnhandledExceptionFilter
VirtualFree
HeapDestroy
lstrcpyW
GetCommandLineW
LoadLibraryA
HeapFree
FreeLibrary
lstrlenW
WideCharToMultiByte
InterlockedIncrement
FormatMessageW
LoadLibraryA
GetTickCount
FormatMessageW
WideCharToMultiByte
GetCommandLineA
GetCommandLineW
InitializeCriticalSection
WideCharToMultiByte
ExitProcess
SetFilePointer
LocalFree
InterlockedDecrement
GetProcessHeap
GetLastError
LeaveCriticalSection
GetLastError
CloseHandle
GetVersionExA
HeapFree
SetFilePointer
GetCommandLineW
SetFilePointer
DeleteCriticalSection
MultiByteToWideChar
GetCurrentThreadId
GetModuleFileNameA
lstrcpyW
lstrcpyW
GetProcAddress
SetFilePointer
InterlockedDecrement
GetCommandLineA
HeapFree
GetACP
DeleteCriticalSection
GetACP
GetCommandLineW
InterlockedIncrement
GetCurrentProcessId
Sections
.text Size: 138KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE