Static task
static1
Behavioral task
behavioral1
Sample
c1f7ea24d058c250e7f3c404e4dddf156f460f945a9ac3e4ad17746ea4f7b96e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c1f7ea24d058c250e7f3c404e4dddf156f460f945a9ac3e4ad17746ea4f7b96e.exe
Resource
win10v2004-20230703-en
General
-
Target
c1f7ea24d058c250e7f3c404e4dddf156f460f945a9ac3e4ad17746ea4f7b96e
-
Size
3.6MB
-
MD5
b862896d86be582ffc1f44c1d4f54146
-
SHA1
76b7bbe7dfe3e67da6c085fd6be2a3fdb5f4bb9a
-
SHA256
c1f7ea24d058c250e7f3c404e4dddf156f460f945a9ac3e4ad17746ea4f7b96e
-
SHA512
2726e042ae190eaddff9bdd08760c184b2f1f9635e88dcadc8569370abe84bda0cf024720b764e26aedb8c974d79405402d4bb89fdfa7b4518d4f4feee703ea7
-
SSDEEP
98304:Fh06ZHnWAJ+oTzAKKnXvIPPP52Yd4gM0JMw:NtJFM/IYYuYJMw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1f7ea24d058c250e7f3c404e4dddf156f460f945a9ac3e4ad17746ea4f7b96e
Files
-
c1f7ea24d058c250e7f3c404e4dddf156f460f945a9ac3e4ad17746ea4f7b96e.exe windows x86
5b3a6d9f066714154cee9655bb398cf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
user32
LoadIconA
gdi32
GetTextMetricsA
winmm
waveOutUnprepareHeader
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayGetElement
comctl32
ImageList_Destroy
ws2_32
inet_ntoa
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.5MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 996KB - Virtual size: 996KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ