Static task
static1
Behavioral task
behavioral1
Sample
c79e035a3a37ce0c2c6782dba590a82d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c79e035a3a37ce0c2c6782dba590a82d.exe
Resource
win10v2004-20240226-en
General
-
Target
c79e035a3a37ce0c2c6782dba590a82d
-
Size
19KB
-
MD5
c79e035a3a37ce0c2c6782dba590a82d
-
SHA1
9e03f328c68e9b4f9baeb298e45f4711ee2c0e26
-
SHA256
e5ece5dbee8a20c0c75fe1aa5d0a4b7778019c1c7c330fcae8b990ca6041580b
-
SHA512
a923867ccc7a52ededf2d4fd63ca38d3c22c15d59afa0db83f231b8497d3f2930dd6b240f7b2544859168edcc2fc2f3074144e46e5f0ca6e41b102a2d7edf6a4
-
SSDEEP
384:yNoScGP4cF3l89/PYjK3moSVxg8cCmTKtdulnfWjvOeo:imyrSXYInSPg8ch2twln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c79e035a3a37ce0c2c6782dba590a82d
Files
-
c79e035a3a37ce0c2c6782dba590a82d.exe windows:4 windows x86 arch:x86
353dca599327708e1cb971dc01db6dd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
FreeLibrary
GetFileAttributesA
GetTempPathA
lstrcpyA
CloseHandle
lstrcatA
GetProcessHeap
CreateEventA
WriteFile
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
LoadLibraryA
RtlUnwind
GetModuleHandleA
WaitForSingleObject
ExitProcess
SetEvent
CreateThread
GetVersionExA
ExitThread
GetProcAddress
user32
DestroyWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
ShowWindow
CreateWindowExA
SetThreadDesktop
CreateDesktopA
CharToOemA
wsprintfA
PeekMessageA
advapi32
RegCloseKey
RegCreateKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ