Static task
static1
Behavioral task
behavioral1
Sample
easyMalicious3263e2e11949.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious3263e2e11949.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious3263e2e11949.exe
-
Size
686KB
-
MD5
1e45457dcdafd6b6de854197e9382730
-
SHA1
df467b4e0d0e5e8e2106e43580a47921e417bb38
-
SHA256
6e4f81268ba065909353d892622095c48ecc473aa5b2dee41804ec61e244a36a
-
SHA512
80882a81a183d482cd11f655aa4a19a5477f1487e79a747f4a768c17f1276bfa77b4f5b917f7ba60d8ebd6cca5c0464a97c627342c88a0cc1aa9380acabb5304
-
SSDEEP
12288:Owy8eeM5B+m+AQ+AaFi5u+bygqp+OuRx+8+m+m+AmQ+m+ufBvv5+m+m+j:g8eeqsaw4PuVpQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource easyMalicious3263e2e11949.exe
Files
-
easyMalicious3263e2e11949.exe.exe windows x86
dc382cc2c4a611eb75394212f058c769
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
GetVolumeInformationA
GetTempFileNameA
GetModuleFileNameA
GetTempPathA
CreateProcessA
Sleep
SetFileAttributesA
GetDriveTypeA
GetLogicalDriveStringsA
GetTickCount
GetLastError
CreateFileMappingA
CreateThread
GetConsoleWindow
SetErrorMode
GetStartupInfoA
GetModuleHandleA
ws2_32
WSAStartup
socket
gethostbyname
connect
send
closesocket
WSACleanup
htons
user32
ShowWindow
msvcrt
_itoa
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
atoi
strlen
fclose
strcat
fgets
strcpy
fopen
fputs
rand
strstr
strrchr
strcmp
ftell
fseek
memset
fwrite
sprintf
strtok
srand
__p___argv
__p___argc
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_strdup
Sections
.bss Size: - Virtual size: 46KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE