Static task
static1
Behavioral task
behavioral1
Sample
0d56cbd6c4ec1cdbf5a54b3fbc13e8ff0587c20a414c7006d324e266123a1586.exe
Resource
win7-20230831-en
General
-
Target
0d56cbd6c4ec1cdbf5a54b3fbc13e8ff0587c20a414c7006d324e266123a1586
-
Size
1.6MB
-
MD5
0a25301f7719104e55017452d81034b9
-
SHA1
2bb87366269c96a56f5af0f02dcfd68980da3fc5
-
SHA256
0d56cbd6c4ec1cdbf5a54b3fbc13e8ff0587c20a414c7006d324e266123a1586
-
SHA512
4900e3754372b4335be24ce46763ccda6efcdcaf7e61e287092ff61fd8cdadd4c56af165726c9ea85fe71bcfdbd352eef68602e99a4e6e2ee21cd9a12cb80a1e
-
SSDEEP
49152:0kKoYM6U8Zh81rYGVerH3GPFr47i/EggW46493vFisRZT1o:Y1ZarYGVwHs47iFxS0sRZTS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d56cbd6c4ec1cdbf5a54b3fbc13e8ff0587c20a414c7006d324e266123a1586
Files
-
0d56cbd6c4ec1cdbf5a54b3fbc13e8ff0587c20a414c7006d324e266123a1586.exe windows x86
2d4f28a911adab9e1e84923b6227161a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
user32
GetSysColorBrush
gdi32
SaveDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
DragQueryFileA
comctl32
ord17
oledlg
ord8
ole32
CLSIDFromString
olepro32
ord253
oleaut32
SysFreeString
wsock32
WSAStartup
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 724KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 936KB - Virtual size: 936KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ