Static task
static1
Behavioral task
behavioral1
Sample
easy_Malicious_25891f7e75b55f590a1bc9f69db444df30ed957f878c2fda4cb8caef58ea8587.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easy_Malicious_25891f7e75b55f590a1bc9f69db444df30ed957f878c2fda4cb8caef58ea8587.exe
Resource
win10v2004-20230621-en
General
-
Target
easy_Malicious_25891f7e75b55f590a1bc9f69db444df30ed957f878c2fda4cb8caef58ea8587.exe
-
Size
107KB
-
MD5
e53cd8c63ea5ddced112e5928e780c1c
-
SHA1
ce40fa0363dc251284c44a99c9ae8159dc68efdd
-
SHA256
e42f33864738854b45b8140a13e469c72c9123a9a8dc4c950496d7c86a48085a
-
SHA512
0be2400bab30b4fe1044897349c90d14ab832c1529ef9843898c42d62682e7196f066619d044a8f94bee682bff0e75e593c8b94c27f3d68099ad28aa5808d04a
-
SSDEEP
1536:NSjRtTkrNCgr0Zu0vShzYWmHtDntyHKOq9wmskMMMlZ8VGVe7ws/Y8WGT:NYRkrHgZf6YfHtZyHKOq6VqVMe7ws/YE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource easy_Malicious_25891f7e75b55f590a1bc9f69db444df30ed957f878c2fda4cb8caef58ea8587.exe
Files
-
easy_Malicious_25891f7e75b55f590a1bc9f69db444df30ed957f878c2fda4cb8caef58ea8587.exe.exe windows x86
820543ba934b9856f90ac38e69fd09e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
FreeLibrary
GetProcAddress
LoadLibraryA
SetFileAttributesA
GetModuleFileNameA
GetLastError
CloseHandle
ReleaseMutex
OpenMutexA
WinExec
GetTempPathA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
WaitForSingleObject
ExitProcess
CreateMutexA
WriteFile
CreateFileA
GlobalFree
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
TerminateThread
lstrlenA
CopyFileA
GetSystemDirectoryA
GlobalMemoryStatusEx
GetComputerNameA
GetLocaleInfoW
SetStdHandle
LCMapStringW
LCMapStringA
SetFilePointer
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
LocalAlloc
InterlockedExchange
RaiseException
GetTickCount
ExitThread
TerminateProcess
DeviceIoControl
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
shell32
ShellExecuteA
ws2_32
send
select
__WSAFDIsSet
recv
WSAStartup
htons
socket
connect
closesocket
WSAIoctl
setsockopt
gethostbyname
inet_addr
sendto
WSASocketA
htonl
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ