Static task
static1
Behavioral task
behavioral1
Sample
b7e9fd6b210b0e4aba15cfffec265a3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7e9fd6b210b0e4aba15cfffec265a3f.exe
Resource
win10v2004-20240226-en
General
-
Target
b7e9fd6b210b0e4aba15cfffec265a3f
-
Size
19KB
-
MD5
b7e9fd6b210b0e4aba15cfffec265a3f
-
SHA1
618566e5042bfdc65aa848afafff243ff256a0a3
-
SHA256
d9f2310980cc89adf2bfd259b5bb62b66c90d4e2b23353f5b351d71be8470583
-
SHA512
788b7a6e93490452cbccd8f4df91b0154abf126a98e06913eb3edacdea514ea93cce1483bd8420da37f08126034f190189febb9683037a39b641bb9e01b1c94a
-
SSDEEP
384:ySf7F7Ga/1oRGvuZn4wqVd3EjK3moSV7W+cCM8Kt1ulnfWjvOeo:7Z71CRUPEInShW+crBtoln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7e9fd6b210b0e4aba15cfffec265a3f
Files
-
b7e9fd6b210b0e4aba15cfffec265a3f.exe windows:4 windows x86 arch:x86
ddc91b758b2f5b1e53249590513dc74f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetFileAttributesA
GetTempPathA
lstrcpyA
CloseHandle
lstrcatA
WaitForSingleObject
GetProcessHeap
WriteFile
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
LoadLibraryA
RtlUnwind
ExitProcess
GetModuleHandleA
CreateEventA
SetEvent
CreateThread
GetVersionExA
ExitThread
GetProcAddress
user32
wsprintfA
DestroyWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
ShowWindow
CreateWindowExA
SetThreadDesktop
CreateDesktopA
CharToOemA
GetTopWindow
PeekMessageA
advapi32
RegCloseKey
RegCreateKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ