Static task
static1
Behavioral task
behavioral1
Sample
a4da5d0b6ae03600ed9c3c8f7d9ad8c0_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a4da5d0b6ae03600ed9c3c8f7d9ad8c0_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
a4da5d0b6ae03600ed9c3c8f7d9ad8c0_exe32.exe
-
Size
88KB
-
MD5
a4da5d0b6ae03600ed9c3c8f7d9ad8c0
-
SHA1
83c03ce0c08a2106efca3a37a9cc4024d66071a5
-
SHA256
f40b5ab678341fc2161e8b2b81e76179fba61632fcef632441a0ee869e207406
-
SHA512
76d87d6f6f33847d9c9ff834cc8a6590f18414770ab8c532496d7576906a7f0f16f6f88794f1e279e35f05b591d2e98430f73a05faa410e73d2e17f56483bd34
-
SSDEEP
1536:ZubSVukcNVdMaIbakrqB4GVHtVVJFJhLjtbtmcIumHssugOeQhO:ZnVBcHdMBWtVVrhb8duwfyO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4da5d0b6ae03600ed9c3c8f7d9ad8c0_exe32.exe
Files
-
a4da5d0b6ae03600ed9c3c8f7d9ad8c0_exe32.exe.exe windows:4 windows x86
23db95a3f91e62dce66b10f4b9df3daa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
MultiByteToWideChar
GetModuleHandleA
GetPrivateProfileIntA
GetProfileStringA
GetProcAddress
lstrcpyA
GetVersion
WritePrivateProfileStringA
FreeEnvironmentStringsA
HeapDestroy
GetFileType
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeLibrary
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
user32
wsprintfA
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE