Static task
static1
Behavioral task
behavioral1
Sample
561852f93b5d9ae27548f46979e1aadbd10446832896f15461245cb93b3bddf9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
561852f93b5d9ae27548f46979e1aadbd10446832896f15461245cb93b3bddf9.exe
Resource
win10v2004-20230703-en
General
-
Target
561852f93b5d9ae27548f46979e1aadbd10446832896f15461245cb93b3bddf9
-
Size
180KB
-
MD5
496a0e73916a843c5bfd695043f364d0
-
SHA1
1e14408535066bc1611a24dbacaaf02e2728ee85
-
SHA256
561852f93b5d9ae27548f46979e1aadbd10446832896f15461245cb93b3bddf9
-
SHA512
6fd2948caa9a76ff66f8ac11ba697258df1565734d383d1f2f2f869a78a839b8174740dee78ff44e34b850713b73691f1c8f8588c7a768eaf61b16076d7b8be3
-
SSDEEP
768:1nONHmGC5ewcC7st1uls3TFM3S9wK5NSbIB4Sa6Eko2MCXWyvkHxHKHpoPcuruw:KHl9C7stgs3okxP8ZSa6THmukRqGc/w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 561852f93b5d9ae27548f46979e1aadbd10446832896f15461245cb93b3bddf9
Files
-
561852f93b5d9ae27548f46979e1aadbd10446832896f15461245cb93b3bddf9.exe windows x86
850871c8d5b3757b0f68f93b860fcd75
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42d
ord4081
ord3692
ord3575
ord2679
ord4021
ord973
ord4279
ord2717
ord2223
ord2222
ord3429
ord4756
ord3361
ord1365
ord3651
ord4174
ord1781
ord4118
ord5076
ord3618
ord4210
ord2077
ord1309
ord1857
ord3069
ord3944
ord3666
ord2076
ord1566
ord5078
ord3002
ord4064
ord1344
ord1830
ord1631
ord4205
ord2340
ord2481
ord2584
ord3691
ord2473
ord2585
ord2341
ord2432
ord2339
ord3143
ord3144
ord3142
ord2431
ord3367
ord3786
ord3661
ord4492
ord697
ord681
ord599
ord2823
ord1087
ord516
ord479
ord354
ord728
ord1855
ord2055
ord2054
ord4689
ord1624
ord1179
ord3450
ord1656
ord450
ord3685
ord4183
ord1239
ord1969
ord4025
ord4291
ord4945
ord4856
ord4952
ord877
ord4583
ord2352
ord454
ord3779
ord3776
ord3774
ord3552
ord5077
ord3702
ord1880
ord1860
ord4415
ord3231
ord1033
ord4130
ord1789
ord2661
ord4227
ord4229
ord2104
ord3366
ord3826
ord4239
ord4215
ord4408
ord3784
ord4078
ord2021
ord1285
ord2986
ord528
ord706
ord5065
ord4951
ord567
ord4228
ord4143
ord308
ord996
ord468
ord3446
ord4820
ord2052
ord4195
ord3629
ord3948
ord4017
ord3831
ord1862
ord4753
ord3362
ord1364
ord4176
ord4208
ord2078
ord1310
ord3670
ord4191
ord3658
ord1952
ord1228
ord2875
ord317
ord574
ord3524
ord1401
ord3527
ord3825
ord2411
ord2415
ord5058
ord1858
ord1876
ord4178
ord4420
ord1350
ord4304
ord2484
ord4387
ord3656
ord4000
ord3950
ord1797
ord3636
ord2753
ord2509
ord4749
ord3373
ord4785
ord4901
ord3785
ord3660
ord328
ord582
ord3938
ord3382
ord1232
ord1956
ord3778
ord3777
ord1490
ord3551
ord3758
ord3978
ord4068
ord3611
ord3616
ord3836
ord3970
ord3729
ord3739
ord3738
ord3726
ord3728
ord3725
ord4004
ord4002
ord3379
ord4175
ord4216
ord3001
ord1343
ord3664
ord526
ord704
ord4190
ord1042
ord1871
ord1284
ord2020
ord1041
ord3369
ord1190
ord2412
ord1784
ord2103
ord3530
ord1417
ord719
ord3657
ord730
ord1100
msvcrtd
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__dllonexit
??1type_info@@UAE@XZ
??3@YAXPAX@Z
strcmp
memset
memcpy
_CxxThrowException
_chkesp
__CxxFrameHandler
_setmbcp
_onexit
kernel32
GetProcAddress
CloseHandle
WriteFile
CreateFileA
ExitProcess
GetStartupInfoA
GetModuleHandleA
shell32
ShellExecuteA
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ