Static task
static1
Behavioral task
behavioral1
Sample
a3da2c7af19199fbc8e93433c0ba3e9f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3da2c7af19199fbc8e93433c0ba3e9f.exe
Resource
win10v2004-20240221-en
General
-
Target
a3da2c7af19199fbc8e93433c0ba3e9f
-
Size
2KB
-
MD5
a3da2c7af19199fbc8e93433c0ba3e9f
-
SHA1
264a33c4899c5f35ad2e0f952982aecfa5fa06d8
-
SHA256
9a0bcda6d917b3b9324741a0b27fe9e42f45ed8ca7f34b1bdb250120cb792d03
-
SHA512
99bd2261bf2b2420f0d08481bddfc44dfbc517d7e140a860470f176c9a8caa06029b5026ffde1d777d8c89ab38c7a3f3efcec7110f5ac2d8c8fa50a9c158c566
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3da2c7af19199fbc8e93433c0ba3e9f
Files
-
a3da2c7af19199fbc8e93433c0ba3e9f.exe windows:4 windows x86 arch:x86
0247cac6803381c0a82a0f7acbdadb37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowThreadProcessId
kernel32
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
CloseHandle
CreateProcessA
CreateRemoteThread
GetModuleFileNameA
GetProcAddress
GetStartupInfoA
LoadLibraryA
OpenProcess
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE