Static task
static1
Behavioral task
behavioral1
Sample
708a4b62b799e9b23e2b5d1b5f017ce7091a54fbb5f95f91a11311ab6b95c7c6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
708a4b62b799e9b23e2b5d1b5f017ce7091a54fbb5f95f91a11311ab6b95c7c6.exe
Resource
win10v2004-20241007-en
General
-
Target
708a4b62b799e9b23e2b5d1b5f017ce7091a54fbb5f95f91a11311ab6b95c7c6
-
Size
35KB
-
MD5
52dbda6f7c9168d08433eb19bb1a789c
-
SHA1
d505718ecd756d99405a55e70db42eb27026ac83
-
SHA256
708a4b62b799e9b23e2b5d1b5f017ce7091a54fbb5f95f91a11311ab6b95c7c6
-
SHA512
44bb91d0072e86278c67ada2483d1c487090b67785a30b36be47467411612b7894c4aa92e6737209cd4422d42098a5f351036eda8a9e75319682300a9ceba855
-
SSDEEP
384:MApc8m4e0GvQak4JI341C0abnk6hJP+wMsE:MApQr0GvdFJI34qTk6hJPIt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 708a4b62b799e9b23e2b5d1b5f017ce7091a54fbb5f95f91a11311ab6b95c7c6
Files
-
708a4b62b799e9b23e2b5d1b5f017ce7091a54fbb5f95f91a11311ab6b95c7c6.exe windows:4 windows x86 arch:x86
7ecd8f76627cb5379a7c0b0c02b48c9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
MoveFileW
GetSystemDirectoryW
shell32
ShellExecuteW
msvcrt
_wstat
_exit
exit
wcscmp
wcscat
fclose
memset
fread
fseek
_wfopen
fwrite
wcslen
wcscpy
wcsstr
__p__commode
wcsncpy
__p__fmode
_XcptFilter
__p___winitenv
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__set_app_type
_except_handler3
_controlfp
_wcslwr
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 798B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.htext Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE