Static task
static1
Behavioral task
behavioral1
Sample
a9c07754eb52154bd41a931cfd388d91.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a9c07754eb52154bd41a931cfd388d91.exe
Resource
win10v2004-20240226-en
General
-
Target
a9c07754eb52154bd41a931cfd388d91
-
Size
83KB
-
MD5
a9c07754eb52154bd41a931cfd388d91
-
SHA1
bc977bd096f39944337e898a34530d4ce853b2bf
-
SHA256
13b2bc0c65fe6cdb67fa4d386627d51b976680d873b381c5a03198545caa9f63
-
SHA512
ce40694cacec41d3b6a8a269cedc6378db50ed836ea52b1b94b87aa958df56d12c57144d9a3bd58bf231d1f415f1d4e6218b8315dc24efde947c006b0f57a10c
-
SSDEEP
1536:Cm3CKzB575c+N9Z38iUxrelV9vjza3I/0CdJTQrBokenC98cA5Di:Cl25UF+bvldJi+kenCyDi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9c07754eb52154bd41a931cfd388d91
Files
-
a9c07754eb52154bd41a931cfd388d91.exe windows:4 windows x86 arch:x86
e6535ae5e31a6fad5e14ad93130df8bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindClose
TlsGetValue
GetTickCount
CloseHandle
GetCommandLineA
GetComputerNameA
Sleep
GetLastError
GetExitCodeProcess
GetModuleHandleA
SearchPathA
GetDriveTypeA
CreateSemaphoreA
GetModuleFileNameA
DeleteCriticalSection
SetLastError
CreateMutexA
VirtualProtect
FreeConsole
shell32
SHGetMalloc
DragAcceptFiles
StrChrA
ShellAboutA
ShellMessageBoxA
DragQueryPoint
SHGetDiskFreeSpaceA
DragQueryFileA
SHFree
SHAlloc
DragFinish
SheChangeDirA
SHGetSettings
SHGetNewLinkInfo
mgmtapi
SnmpMgrRequest
SnmpMgrClose
SnmpMgrOpen
SnmpMgrGetTrap
SnmpMgrCtl
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ