Static task
static1
Behavioral task
behavioral1
Sample
df14b90af4515bc5420e53fe83e5ae79.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
df14b90af4515bc5420e53fe83e5ae79.exe
Resource
win10v2004-20240226-en
General
-
Target
df14b90af4515bc5420e53fe83e5ae79
-
Size
11KB
-
MD5
df14b90af4515bc5420e53fe83e5ae79
-
SHA1
af5fc62bbf4f22561f9126511fd038866831d117
-
SHA256
81827b4f6ab557996002ace608476e13bf4e5ac64619992dd3a1eb48d90721c5
-
SHA512
9224141b53b6152357388aeac08acd6959618d682d97dcf31b7c75b808714fd9e719e12471efb09b2bbb616275ab25ded7e7b6f227bb2e2963491c5018339c75
-
SSDEEP
96:g/kkd3Gf5Aesj1HiWD4AnBq3JJVQa7NObQ0wdZSbrQDgFgpKXGenkiTiaxjIPmiT:1nPGliWyJJV4Q1S/qJaxcPHn14wMiKL6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df14b90af4515bc5420e53fe83e5ae79
Files
-
df14b90af4515bc5420e53fe83e5ae79.exe windows:4 windows x86 arch:x86
bc2859e2e3a263ee3e493b0520f28d16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetCommandLineA
SetFileAttributesA
DeleteFileA
Sleep
CreateProcessA
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
SetCurrentDirectoryA
lstrcatA
GetSystemTime
HeapFree
ReadFile
HeapAlloc
GetProcessHeap
CloseHandle
GetFileSize
CreateFileA
WriteFile
GetLocalTime
lstrlenA
SetFilePointer
ExitProcess
GetModuleHandleA
GetStartupInfoA
lstrcmpiA
user32
wsprintfA
advapi32
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
ChangeServiceConfigA
ChangeServiceConfig2A
StartServiceA
SetServiceStatus
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ