Static task
static1
Behavioral task
behavioral1
Sample
44e1971b4df5a3aa8cafbe884404776f5dbdacd41b06dcd7d0e385166f5fb608.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44e1971b4df5a3aa8cafbe884404776f5dbdacd41b06dcd7d0e385166f5fb608.exe
Resource
win10v2004-20230915-en
General
-
Target
44e1971b4df5a3aa8cafbe884404776f5dbdacd41b06dcd7d0e385166f5fb608
-
Size
1.6MB
-
MD5
df02aa581b59dcef61e9b3383a233d7b
-
SHA1
616caed93edc5fbab5fddaa6a9b84842b87fee06
-
SHA256
44e1971b4df5a3aa8cafbe884404776f5dbdacd41b06dcd7d0e385166f5fb608
-
SHA512
471bd06269acf512f9e55bc88ded6bc13fabcfc7e203e9907f9e78ca37667fca5ae3626f49a1eaf226150b58fee6efe66b8c6704541c0cd5da07397806a4e0c4
-
SSDEEP
49152:OJt/ZrhEItK4Ojd4Y0vtnNhqbWrJ8i9o1M:eBrhEItK4Oh5A8im1M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44e1971b4df5a3aa8cafbe884404776f5dbdacd41b06dcd7d0e385166f5fb608
Files
-
44e1971b4df5a3aa8cafbe884404776f5dbdacd41b06dcd7d0e385166f5fb608.exe windows:4 windows x86
5a3528dd5fe4788248db77f68693a2db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockFile
user32
GetMenuItemCount
gdi32
CreatePalette
winmm
midiStreamRestart
winspool.drv
ClosePrinter
advapi32
RegQueryValueA
shell32
ShellExecuteA
ole32
OleInitialize
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
ws2_32
recvfrom
comdlg32
GetFileTitleA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 544KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 964KB - Virtual size: 964KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ