Static task
static1
Behavioral task
behavioral1
Sample
50f40d044dab0930e837b5e80fa426d503337019fb22f5629214b2c48cce3e55.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
50f40d044dab0930e837b5e80fa426d503337019fb22f5629214b2c48cce3e55.exe
Resource
win10v2004-20230703-en
General
-
Target
50f40d044dab0930e837b5e80fa426d503337019fb22f5629214b2c48cce3e55
-
Size
3.5MB
-
MD5
1d8d816fbe2b15be698786f3f1708b0d
-
SHA1
177c65e0f499e9e71c79492442d0cf054dd2c085
-
SHA256
50f40d044dab0930e837b5e80fa426d503337019fb22f5629214b2c48cce3e55
-
SHA512
656aa98ef69c9816f0d818898b9878e09dcf8976bfece3816818352b9ea60544fcbea2c00fb6073dca59b7bc97453a6bae3e205a0b17b4af1ad446942067cfa5
-
SSDEEP
49152:VV4mc2B/GwUIR6bD3V6VYQgYSgFCS3dbaWm5yySqyyKnMLqeM2sG/Hap:P4mc2cwUIR6bD3cY1YJbaWDqeV2kp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50f40d044dab0930e837b5e80fa426d503337019fb22f5629214b2c48cce3e55
Files
-
50f40d044dab0930e837b5e80fa426d503337019fb22f5629214b2c48cce3e55.exe windows x86
c7a59fd05f02f21ff21aee5552fd5dd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
user32
GetMenuItemCount
gdi32
SelectPalette
winmm
midiStreamRestart
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayGetUBound
comctl32
ord17
ws2_32
recvfrom
comdlg32
GetFileTitleA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.5MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 996KB - Virtual size: 996KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ