Static task
static1
Behavioral task
behavioral1
Sample
a97f0801696211761a4c71c156765d40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a97f0801696211761a4c71c156765d40N.exe
Resource
win10v2004-20240802-en
General
-
Target
a97f0801696211761a4c71c156765d40N.exe
-
Size
43KB
-
MD5
a97f0801696211761a4c71c156765d40
-
SHA1
2029976ab0abe216e8741ee51926bc8a470924c9
-
SHA256
be1ae91b1d2d529d78904e553f5dfe1811403906ce5e1a2cd1359a490040604a
-
SHA512
d67d0367b5813274d11f91c2ff1fc0ead5cc9275b86d1471c1bc8e06167e585d565d7fffdbfa66a711270cb18bd71315619a47f21f4b2feb86be17b75d6f5e57
-
SSDEEP
768:A/E+UlejKbjWwKtUZS6KUAghE3c1ng8o6dlZYs28E:AC2tUZdHAMEyngBIS98E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a97f0801696211761a4c71c156765d40N.exe
Files
-
a97f0801696211761a4c71c156765d40N.exe.exe windows:4 windows x86 arch:x86
13169adaa55a4b4676c2eeddc904744e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_controlfp
_except_handler3
__set_app_type
_XcptFilter
__p__fmode
_exit
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
user32
PostQuitMessage
DialogBoxParamA
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
kernel32
lstrcpynA
GetFileType
CloseHandle
FindNextFileA
GetFileSize
DeleteFileA
FindFirstFileA
GetModuleHandleA
CreateFileA
GetStartupInfoA
GetLogicalDriveStringsA
GetEnvironmentStringsA
FindClose
GetModuleFileNameA
gdi32
CreateFontIndirectA
comctl32
ord17
shfolder
SHGetFolderPathA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ