Static task
static1
Behavioral task
behavioral1
Sample
a07f7fc10f1f9907df51923e03770eed.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a07f7fc10f1f9907df51923e03770eed.exe
Resource
win10v2004-20240221-en
General
-
Target
a07f7fc10f1f9907df51923e03770eed
-
Size
28KB
-
MD5
a07f7fc10f1f9907df51923e03770eed
-
SHA1
eec806096fe28804da4497ad943839b79364ba74
-
SHA256
8866f43711e73901083c4c65af66a603171c3ad2b3a67373d2c339af7f03b5dd
-
SHA512
63daa37485982e1cfd96b52bdbc31c46afdf31b07585e16b0700763dfdef9aeb70851898c5f5d0dbb3356b68630ec7519a689f2623ab285587e901cb9ddbe233
-
SSDEEP
384:+CXqnjxTCNIf0ei+PT7i/uJMd9FJ5wGYIw1Ev:bqhCNIfPi+PT71krB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a07f7fc10f1f9907df51923e03770eed
Files
-
a07f7fc10f1f9907df51923e03770eed.exe windows:4 windows x86 arch:x86
58b659c22db64e33d336d198de4c390c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
AddAtomA
AllocConsole
ExitProcess
FindAtomA
GetAtomNameA
SetUnhandledExceptionFilter
msvcrt
_sleep
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
ctime
exit
fclose
fflush
fopen
fprintf
fputc
fputs
fread
free
fseek
ftell
malloc
memcpy
memset
perror
signal
strcat
strcpy
strlen
strncat
time
user32
FindWindowA
GetAsyncKeyState
ShowWindow
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
socket
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE