Static task
static1
Behavioral task
behavioral1
Sample
5646936e6eb9c05d8d0a89edb30dff8f203ccea7644bfd6e49c9e8de2b41ee4f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5646936e6eb9c05d8d0a89edb30dff8f203ccea7644bfd6e49c9e8de2b41ee4f.exe
Resource
win10v2004-20230703-en
General
-
Target
5646936e6eb9c05d8d0a89edb30dff8f203ccea7644bfd6e49c9e8de2b41ee4f
-
Size
1.1MB
-
MD5
eecad3d37989ecf7b6f6b337c65ffbae
-
SHA1
f75d83d72c11ba4f8f266aa49d74217cc18c42a9
-
SHA256
5646936e6eb9c05d8d0a89edb30dff8f203ccea7644bfd6e49c9e8de2b41ee4f
-
SHA512
eb7c8aa2ef2b135eb22e8ccd2fb5cd11e35ffec8809619e3a73432d71e81f417d81b3b20b936d49f7b249113149a3572298f6d7ce582a519b12baa54cc16bd5f
-
SSDEEP
24576:37FYID6d7GuJju7hbhbk0A7dx52nsEi9/Z2ufSFV+PL+hsvso6YU8HneKHx97N31:x16dr6k0Cn4sEiL36+PZnDH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5646936e6eb9c05d8d0a89edb30dff8f203ccea7644bfd6e49c9e8de2b41ee4f
Files
-
5646936e6eb9c05d8d0a89edb30dff8f203ccea7644bfd6e49c9e8de2b41ee4f.exe windows x86
76044d9a4872366c43a1f3c1563bb38d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
user32
PostThreadMessageA
gdi32
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
comctl32
ImageList_GetImageCount
oledlg
ord8
ole32
OleInitialize
olepro32
ord253
oleaut32
SysFreeString
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 192KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 936KB - Virtual size: 936KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ