Static task
static1
Behavioral task
behavioral1
Sample
707b49049d9bae2345de900778dc41369322dce55b7c4f3faa829f6f7988d686N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
707b49049d9bae2345de900778dc41369322dce55b7c4f3faa829f6f7988d686N.exe
Resource
win10v2004-20240802-en
General
-
Target
707b49049d9bae2345de900778dc41369322dce55b7c4f3faa829f6f7988d686N
-
Size
12KB
-
MD5
fe176e2994239024d7917312f83dc390
-
SHA1
dfd3408f3c56f97035e292f57837bbf63e55ef58
-
SHA256
707b49049d9bae2345de900778dc41369322dce55b7c4f3faa829f6f7988d686
-
SHA512
bd71160f259c092362ad6fcfaecc25827885e4c61316aff9e645faec0e773777f3576240d71a268d3f84391214a8ad101b43d8b9f92aa38ba9a4e03884e713b4
-
SSDEEP
96:nPEH0eyCXiKjug9J+Q8sAhf/LMY7w+l8mb0l74zD1rx78GIz4BO09KljdVG:nTbCXE99f/Lk+imY5qDz4GI+ZKZ/G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 707b49049d9bae2345de900778dc41369322dce55b7c4f3faa829f6f7988d686N
Files
-
707b49049d9bae2345de900778dc41369322dce55b7c4f3faa829f6f7988d686N.exe windows:1 windows x86 arch:x86
8f8cf676b456b4fc42fb0362e8d00dbf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
CloseHandle
EXITPROCESS
CreateProcessA
GlobalAlloc
GetTickCount
FindNextFileA
GetCommandLineA
GetCurrentDirectoryA
CopyFileA
FindFirstFileA
CreateFileA
GlobalLock
GlobalUnlock
MoveFileA
SetCurrentDirectoryA
SetFilePointer
WriteFile
lstrcpyA
GetSystemTime
user32
SetClipboardData
OpenClipboard
MessageBoxA
ExitWindowsEx
EmptyClipboard
CloseClipboard
Sections
CODE Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ