APPEAL
Static task
static1
Behavioral task
behavioral1
Sample
fa72a116dfa91c827ea88329118aad5040a6d45ed048fb06ba366e1c9ed50eed.exe
Resource
win7-20240221-en
General
-
Target
fa72a116dfa91c827ea88329118aad5040a6d45ed048fb06ba366e1c9ed50eed
-
Size
56KB
-
MD5
afa20af3e202c0687c3c475eadb8dcb6
-
SHA1
fb03f9cfd68e36931b8b58c0b2d3632d92e8e7fc
-
SHA256
fa72a116dfa91c827ea88329118aad5040a6d45ed048fb06ba366e1c9ed50eed
-
SHA512
3f9deb769b0623875117834076cfbaf9851567acd797dc4109708f6dbb5297e178c7c41b23b6f736b9136def97a5ae8d840981d93f0d7c8c27642d2b25f64bf5
-
SSDEEP
768:UbP88gnVSOAt26e3VpwWnbM3dsZ5QWRogviX0bzqw1KxVUN18PYJ:gP8P5Ce3VmbMo6mw8kN18PYJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa72a116dfa91c827ea88329118aad5040a6d45ed048fb06ba366e1c9ed50eed
Files
-
fa72a116dfa91c827ea88329118aad5040a6d45ed048fb06ba366e1c9ed50eed.exe windows:4 windows x86 arch:x86
c23f0f158228157d9c86ee49b3900426
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__fmode
__set_app_type
_except_handler3
__p__commode
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
??3@YAXPAX@Z
strstr
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
free
realloc
_stricmp
kernel32
GetModuleHandleA
OutputDebugStringA
HeapFree
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualFree
VirtualProtect
VirtualAlloc
GetProcessHeap
HeapAlloc
Sleep
GetStartupInfoA
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ