Static task
static1
Behavioral task
behavioral1
Sample
68fe3bc31e2dba469f1e1d3101495c71be2dbc268d52782fb187aa3ffbc91a36.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
68fe3bc31e2dba469f1e1d3101495c71be2dbc268d52782fb187aa3ffbc91a36.exe
Resource
win10v2004-20230915-en
General
-
Target
68fe3bc31e2dba469f1e1d3101495c71be2dbc268d52782fb187aa3ffbc91a36
-
Size
893KB
-
MD5
be91e5bf98a5a1114500f6999f819548
-
SHA1
13585c026ebc2d2d56031ed0a667f1f86e61c02b
-
SHA256
68fe3bc31e2dba469f1e1d3101495c71be2dbc268d52782fb187aa3ffbc91a36
-
SHA512
5b3359f228d1b25f2ba3669524a9be5ac9129e1ae77d567d080e3a1be647781a71a0942c9f337cba0a1d98e6b20e685687a77f4204a339b8d3cdea2af5b3f05e
-
SSDEEP
12288:v/4mwTALJPMTR0WrwXY7MIrFu8mPRdcQJwmfqCdTg7Lx5jW7lyNG4y:vw6STR/rcwr48mJjJwWqDxJWxy/y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68fe3bc31e2dba469f1e1d3101495c71be2dbc268d52782fb187aa3ffbc91a36
Files
-
68fe3bc31e2dba469f1e1d3101495c71be2dbc268d52782fb187aa3ffbc91a36.exe windows:5 windows x86
320ffb3ead7d13ea9d4a4b7814c6523f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
user32
GetWindow
advapi32
RegDeleteKeyA
Sections
.text Size: 74KB - Virtual size: 376KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 808KB - Virtual size: 808KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ