Static task
static1
Behavioral task
behavioral1
Sample
entry_1_0/2023_12_15 .exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
entry_1_0/2023_12_15 .exe
Resource
win10v2004-20240226-en
General
-
Target
file_b3f4b10cb99e4d4b9dfff7fea2beeb35_2024-03-11_10_40_43_159000.zip
-
Size
86KB
-
MD5
93f25e6d3f515346a0f7366a4ca83738
-
SHA1
45316626ab20c66d0176a296ef042200f50ea6d0
-
SHA256
4ba4b265ff94c193815309485f353d74a491ed35204ec1d08b7963f892ef1208
-
SHA512
c6fbf2f1380f566d9700b61eecc2f921c8953d881e180b3d886a7e0ca553e8f0f5d77067eb25b774dbab29d442405dad8d7ac256531197f1d0d5fcb56e0e1547
-
SSDEEP
1536:TocNUKUu+Vp/Ik2X2LipiR7BN/LRoAsVO6KG4chE9GAu5effxF6Dudv+JyD4YAeK:scNU9XL2XMIiRNN/LeAlWk96MDsuvD4/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/entry_1_0/2023_12_15 .exe
Files
-
file_b3f4b10cb99e4d4b9dfff7fea2beeb35_2024-03-11_10_40_43_159000.zip.zip
-
entry_1_0/2023_12_15 .exe.exe windows:4 windows x86 arch:x86
6039c26165040db47e28057ca34786ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
srand
memcmp
strcat
isdigit
isspace
memcpy
rename
memset
_EH_prolog
__CxxFrameHandler
strcmp
strncpy
strstr
strcpy
rand
abs
strlen
user32
MessageBoxA
wvsprintfA
kernel32
GetModuleHandleA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
GetTickCount
GetStartupInfoA
GetCommandLineA
ExitProcess
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
manifest.json