Static task
static1
Behavioral task
behavioral1
Sample
easy_Malicious_08829315dd4dd635c8bea2f7866d03b28416d28008ae42f92cdfcde126da8065.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easy_Malicious_08829315dd4dd635c8bea2f7866d03b28416d28008ae42f92cdfcde126da8065.exe
Resource
win10v2004-20230703-en
General
-
Target
easy_Malicious_08829315dd4dd635c8bea2f7866d03b28416d28008ae42f92cdfcde126da8065.exe
-
Size
151KB
-
MD5
e6247cd0ea0510cd3a0fd6bbf311f735
-
SHA1
a3488bf7d5a78a9211805f4a56bfc669854fdd9a
-
SHA256
ce1b05a63fdea0a34ad5991813d222e8d31609cb1a54de21276ca411a367d5e2
-
SHA512
61b114fd77409abfb3a83a3c43db200f95eb424706bbe1ce9e0ff45119889976a067b91fe4bce9be818d6ba2a3d2ac9680a5adc4f5cc54d7c278ba781b8e381e
-
SSDEEP
3072:AVnwm6fcd1Ad3dM/8tggAbm/qbIgbXBziVg94ATQHtyETc5/0+wmDq+SgT:AL6kd1AdNM/8KgAbm/IIwag94ATatAlP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource easy_Malicious_08829315dd4dd635c8bea2f7866d03b28416d28008ae42f92cdfcde126da8065.exe
Files
-
easy_Malicious_08829315dd4dd635c8bea2f7866d03b28416d28008ae42f92cdfcde126da8065.exe.exe windows x86
6039c26165040db47e28057ca34786ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
srand
memcmp
strcat
isdigit
isspace
memcpy
rename
memset
_EH_prolog
__CxxFrameHandler
strcmp
strncpy
strstr
strcpy
rand
abs
strlen
user32
MessageBoxA
wvsprintfA
kernel32
GetModuleHandleA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
GetProcAddress
GetTickCount
GetStartupInfoA
GetCommandLineA
ExitProcess
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ