Static task
static1
Behavioral task
behavioral1
Sample
8363b78d4b3f4cbb2c507931a1d929c7e7c1ccc762027591a2baf6ae79188836N.exe
Resource
win7-20240903-en
General
-
Target
8363b78d4b3f4cbb2c507931a1d929c7e7c1ccc762027591a2baf6ae79188836N
-
Size
157KB
-
MD5
015c7b8d0f40c99483f58804206bb280
-
SHA1
f01dba8f2ea3116d243cd7fa9d1c60e7c0ab7e63
-
SHA256
8363b78d4b3f4cbb2c507931a1d929c7e7c1ccc762027591a2baf6ae79188836
-
SHA512
cbe7a0e3dc9946b98e2d73c471406d62e1a5083ca05a26b7740725f489233f712e31a62bd15df86239057e4023644543cf9ee801d1bf3ddf11938570910231f9
-
SSDEEP
3072:GF81ZiZSUH2w8e3bV/PkKjz2AwU18A31i9GeGOC2K:hZiguX84kKWU18o0otv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8363b78d4b3f4cbb2c507931a1d929c7e7c1ccc762027591a2baf6ae79188836N
Files
-
8363b78d4b3f4cbb2c507931a1d929c7e7c1ccc762027591a2baf6ae79188836N.exe windows:4 windows x86 arch:x86
6039c26165040db47e28057ca34786ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
srand
memcmp
strcat
isdigit
isspace
memcpy
rename
memset
_EH_prolog
__CxxFrameHandler
strcmp
strncpy
strstr
strcpy
rand
abs
strlen
user32
MessageBoxA
wvsprintfA
kernel32
GetModuleHandleA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
GetTickCount
GetStartupInfoA
GetCommandLineA
ExitProcess
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ