Static task
static1
Behavioral task
behavioral1
Sample
Malicious_d5c0e7b3f866b4dad2b94464270ff409171f111feada678f51ef2d3b116fabd2.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Malicious_d5c0e7b3f866b4dad2b94464270ff409171f111feada678f51ef2d3b116fabd2.exe
Resource
win10v2004-20230621-en
General
-
Target
Malicious_d5c0e7b3f866b4dad2b94464270ff409171f111feada678f51ef2d3b116fabd2.exe
-
Size
53KB
-
MD5
fdf564702170ae865b7fceb085c49567
-
SHA1
27126ed5a39cbddad12c4518c3a265d0aa0cfedd
-
SHA256
d5c0e7b3f866b4dad2b94464270ff409171f111feada678f51ef2d3b116fabd2
-
SHA512
823048fd0bb339bbb79dd8e15337ed8b39857a9f977986efe175ce77517aecb59a36a152bee88283408d323031876e3576d76a28f6d6630c7032c7a061906a77
-
SSDEEP
1536:PFzXwWnSF4hnCce7WHZKqugA0GQOpQREEMoY:9zXwxF4hCceiHM7puEEMoY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Malicious_d5c0e7b3f866b4dad2b94464270ff409171f111feada678f51ef2d3b116fabd2.exe
Files
-
Malicious_d5c0e7b3f866b4dad2b94464270ff409171f111feada678f51ef2d3b116fabd2.exe.exe windows x64
0db77ed4e826b973997d4487b69c8aaf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
cygwin1
__cxa_atexit
__errno
__getreent
__locale_ctype_ptr
__locale_mb_cur_max
__main
_dll_crt0
_exit
_impure_ptr
abort
calloc
cygwin_detach_dll
cygwin_internal
dll_dllcrt0
error
exit
fclose
fprintf
fputs_unlocked
free
fwrite
getenv
getopt_long
isatty
iswprint
malloc
mbrtowc
mbsinit
memcmp
memcpy
memset
nl_langinfo
optind
posix_memalign
printf
program_invocation_name
program_invocation_short_name
puts
realloc
setlocale
sprintf
strchr
strcmp
strdup
strlen
strncmp
strrchr
ttyname
cygintl-8
libintl_bindtextdomain
libintl_gettext
libintl_setlocale
libintl_textdomain
kernel32
GetACP
GetModuleHandleA
GetModuleHandleW
GetProcAddress
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.buildid Size: 512B - Virtual size: 53B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 864B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ