Static task
static1
Behavioral task
behavioral1
Sample
9bad2069470354d78804714ca801a9592023611cffdf7deece075a029fc7a970.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9bad2069470354d78804714ca801a9592023611cffdf7deece075a029fc7a970.exe
Resource
win10v2004-20230703-en
General
-
Target
9bad2069470354d78804714ca801a9592023611cffdf7deece075a029fc7a970
-
Size
3.8MB
-
MD5
cb81dfb196e4c63c5b58ca2678ba8cb1
-
SHA1
c856dc8536477d25d3655bf7d81c762dd4970bdd
-
SHA256
9bad2069470354d78804714ca801a9592023611cffdf7deece075a029fc7a970
-
SHA512
c44102b69c4213c22501c7df6b30a203e742cc9e93cbebaa3862043709e1a2cf94f6fd94f3f4dbcf7329e9334f35e4b614696781499a38206e96c33a77d30d50
-
SSDEEP
49152:JLY9EhvITY1LMGySEYl1YZ2m8XTvAXTPdYmrV4IYkDkHEPTIfvuTmsbzx1:pYahvITYNfbFTMrvOUYHECWTbx1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9bad2069470354d78804714ca801a9592023611cffdf7deece075a029fc7a970
Files
-
9bad2069470354d78804714ca801a9592023611cffdf7deece075a029fc7a970.exe windows x86
c7a59fd05f02f21ff21aee5552fd5dd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
user32
GetMenuItemCount
gdi32
SelectPalette
winmm
midiStreamRestart
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayGetUBound
comctl32
ord17
ws2_32
recvfrom
comdlg32
GetFileTitleA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.8MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 1000KB - Virtual size: 1000KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ