Static task
static1
Behavioral task
behavioral1
Sample
e3cd1fc2802df9483dcb8883b56c149b727bddc73c08f2df9de9aca5a113b463.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e3cd1fc2802df9483dcb8883b56c149b727bddc73c08f2df9de9aca5a113b463.exe
Resource
win10v2004-20230915-en
General
-
Target
e3cd1fc2802df9483dcb8883b56c149b727bddc73c08f2df9de9aca5a113b463
-
Size
5KB
-
MD5
faf6a3f7946d720723f36497962e8906
-
SHA1
8682e4136bd3b70a35066eba768ac1f7bc8e7abd
-
SHA256
e3cd1fc2802df9483dcb8883b56c149b727bddc73c08f2df9de9aca5a113b463
-
SHA512
165cfaa0c5d3ce823f4686902abd734858615e28d0967933a32fdee05ed1166f88ed469b0131701f2be69368b72e18b14f348ff1ce3962a73b8d0632e0f57f8b
-
SSDEEP
48:SrlXWFPpT+dXVfzZh4yMGcKzMEkTaak4PAZivO2pB42pBdvMZL2R7tnRuqSxp:kWLkFfNnOKYloIQ2pm2pbYSVxE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e3cd1fc2802df9483dcb8883b56c149b727bddc73c08f2df9de9aca5a113b463
Files
-
e3cd1fc2802df9483dcb8883b56c149b727bddc73c08f2df9de9aca5a113b463.exe windows:5 windows x86
7c5f9b19847a4e36080308f0e2c5add5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CloseHandle
VirtualFree
GetProcessHeap
CreateFileMappingW
MapViewOfFile
OpenProcess
UnmapViewOfFile
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 538B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 174B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ