Static task
static1
Behavioral task
behavioral1
Sample
c0c6664e09d6026b94eaf9adc4c1bb54.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c0c6664e09d6026b94eaf9adc4c1bb54.exe
Resource
win10v2004-20231215-en
General
-
Target
c0c6664e09d6026b94eaf9adc4c1bb54
-
Size
3KB
-
MD5
c0c6664e09d6026b94eaf9adc4c1bb54
-
SHA1
71e8663244cf37d7979287ae7657084ce3d99b88
-
SHA256
2351a16e7e2950efc2cfa70a73c00d3b280a6c0bf7a000cd5ecd8570cb41e341
-
SHA512
cb622644d8cb288760cc237b285a5011db65fe6ed6b496cafc8ccd3d469111c153bb961170db9f19076305d123b0892599c5f9d3bc50f98c8d97fe1801645526
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0c6664e09d6026b94eaf9adc4c1bb54
Files
-
c0c6664e09d6026b94eaf9adc4c1bb54.exe windows:4 windows x86 arch:x86
5341bbac6286c5da7c2284aeda0a80d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
WinExec
WriteProcessMemory
OpenProcess
GetModuleHandleA
SetLastError
GetCurrentProcessId
VirtualFree
CreateRemoteThread
VirtualAlloc
ResumeThread
GetPriorityClass
CloseHandle
user32
FindWindowA
GetWindowThreadProcessId
urlmon
URLDownloadToFileA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE