Static task
static1
Behavioral task
behavioral1
Sample
Malicious_fd95ca3b467e33168a50d8d2bab86cee3738805b3b2c533e4192b482ad91e539.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_fd95ca3b467e33168a50d8d2bab86cee3738805b3b2c533e4192b482ad91e539.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_fd95ca3b467e33168a50d8d2bab86cee3738805b3b2c533e4192b482ad91e539.exe
-
Size
91KB
-
MD5
637e447047260401d7ab3ef809ddd4ce
-
SHA1
8f84582a0968843347b755af121785b8f25822d4
-
SHA256
fd95ca3b467e33168a50d8d2bab86cee3738805b3b2c533e4192b482ad91e539
-
SHA512
56d005df1118a5ae108bfe36049078c7a7bb38a9d70296d0e0e65ebdf626f620a1550e54671365814d0e61e56b402f243ad4ebd937adc3cb3e57f9d00360edde
-
SSDEEP
768:4dOqniZFDBN9TD6EFByV84HgWV6gGgHWzyaKFzqPddvcMDzxWrid0dFOvYO7yl:4gqnM99TD6Eyl6Q+dvcMDzxW/dF6Y9l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_fd95ca3b467e33168a50d8d2bab86cee3738805b3b2c533e4192b482ad91e539.exe
Files
-
Malicious_fd95ca3b467e33168a50d8d2bab86cee3738805b3b2c533e4192b482ad91e539.exe.exe windows x64
f00459c910cc7913a83a40f8a35bfb5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
cygwin1
__assert_func
__ctype_ptr__
__cxa_atexit
__errno
__getreent
__main
_dll_crt0
_impure_ptr
abort
calloc
cygwin_conv_path
cygwin_conv_path_list
cygwin_create_path
cygwin_detach_dll
cygwin_internal
cygwin_split_path
dll_dllcrt0
environ
exit
fclose
fopen
fprintf
free
getcwd
getenv
getpwnam
getpwuid
getuid
lstat
malloc
memcpy
posix_memalign
readlink
realloc
setenv
setlocale
spawnv
sprintf
stpcpy
strcasecmp
strcat
strchr
strcpy
strcspn
strdup
strerror
strlen
strncmp
strncpy
strrchr
strtok
strtol
vsprintf
kernel32
AllocConsole
CloseHandle
CreateFileA
CreatePipe
CreateProcessA
FreeConsole
GetCommTimeouts
GetConsoleScreenBufferInfo
GetEnvironmentVariableA
GetExitCodeProcess
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStdHandle
GetVersion
LoadLibraryA
QueryInformationJobObject
ReadFile
SetCommTimeouts
SetEnvironmentVariableA
SetHandleInformation
WaitForMultipleObjects
WaitForSingleObject
shell32
SHGetFileInfoA
user32
MessageBoxA
SetParent
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ