Static task
static1
Behavioral task
behavioral1
Sample
b717ac0088937b5a6a44b16f6a1b1955.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b717ac0088937b5a6a44b16f6a1b1955.exe
Resource
win10v2004-20240226-en
General
-
Target
b717ac0088937b5a6a44b16f6a1b1955
-
Size
26KB
-
MD5
b717ac0088937b5a6a44b16f6a1b1955
-
SHA1
7cad9ff25393e5c216398a194185c3fc8b1d4cc2
-
SHA256
5c6d8ba154464ef61567eb41407831f9fd0aec6e382a8f5191282bfde70cc9df
-
SHA512
438285cf1fb99968f6331759085d023c96a464aef0e29091d8e7976743394d624779b94e81301bbc5098ec168352195b4d79c40d868d0b3c9ba1f182b4838368
-
SSDEEP
768:QuFzp4Z/p/tbR4cnvcnsH4ASWbYTC5WJ0Al7MftRA:bzO/tbWWEo4AQTdJ/Ro
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b717ac0088937b5a6a44b16f6a1b1955
Files
-
b717ac0088937b5a6a44b16f6a1b1955.exe windows:4 windows x86 arch:x86
ae5d100bea5c2650e75f7bb24aff320d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strncpy
strlen
memcpy
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GetModuleFileNameA
GetShortPathNameA
CreateProcessA
CloseHandle
GetTickCount
FreeLibrary
LoadLibraryA
GetProcAddress
DeleteFileA
WriteFile
HeapFree
CreateFileA
HeapAlloc
HeapReAlloc
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.code Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 512B - Virtual size: 263B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE