Static task
static1
Behavioral task
behavioral1
Sample
00787c333dd6bf57d3b2d1c5721542cbf00edaea1f5a5d441df6066141e35ebc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00787c333dd6bf57d3b2d1c5721542cbf00edaea1f5a5d441df6066141e35ebc.exe
Resource
win10v2004-20231215-en
General
-
Target
00787c333dd6bf57d3b2d1c5721542cbf00edaea1f5a5d441df6066141e35ebc
-
Size
5.0MB
-
MD5
f90a2baebfa7af346a0dff444d94ec3b
-
SHA1
fbb176d7dae25e58ad2ebe66232f08b09e2eb06e
-
SHA256
00787c333dd6bf57d3b2d1c5721542cbf00edaea1f5a5d441df6066141e35ebc
-
SHA512
b034e26ce8bb409156e235506ff6d1365d2b03394b9601eecc2d934552aa19f0eb6581addcf0c691c49b6fdd8b23c8f26ab4640a7b41e0137c676ccc79a0b4db
-
SSDEEP
49152:k6kSSTbj5nn6jml6MP6V9eCDr84DYCJucUSr1ED8io6YtW5IctN29gZFp007U/vz:krZP7Qr8SJrAV5IUIgN007gvwk7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00787c333dd6bf57d3b2d1c5721542cbf00edaea1f5a5d441df6066141e35ebc
Files
-
00787c333dd6bf57d3b2d1c5721542cbf00edaea1f5a5d441df6066141e35ebc.exe windows:4 windows x86 arch:x86
149d9794f74e526c5560b6303671e4d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetProcAddress
GetModuleHandleExA
lstrcpynA
RtlMoveMemory
GetCurrentProcess
ReadProcessMemory
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
FreeLibrary
LoadLibraryA
LCMapStringA
msvcrt
atoi
_ftol
sprintf
free
malloc
strchr
modf
realloc
??3@YAXPAX@Z
memmove
strncmp
__CxxFrameHandler
user32
wsprintfA
MessageBoxA
Sections
.text Size: 596KB - Virtual size: 593KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 424KB - Virtual size: 421KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.."{Q Size: 360KB - Virtual size: 360KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aAa+ Size: 896KB - Virtual size: 896KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
._o`R Size: 144KB - Virtual size: 144KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AH($ Size: 356KB - Virtual size: 356KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.quK! Size: 280KB - Virtual size: 280KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tT3I Size: 404KB - Virtual size: 404KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t`mz Size: 128KB - Virtual size: 128KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yiw) Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE