Static task
static1
Behavioral task
behavioral1
Sample
1942.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1942.exe
Resource
win10v2004-20231023-en
General
-
Target
1942.exe
-
Size
16KB
-
MD5
cd1d07a6f833e305f3babd08aa15973b
-
SHA1
b56bef67fb192628ee1222c278a9728a5dd51560
-
SHA256
779ed4a60928218cd88f54fbd288fae43154f63d11365338c74788ebdb35a554
-
SHA512
064e63e4691d50e40987ca685b61157e05f0287a41cc88d02fc2cc400c2323f00480ca688573dafc097e032a8832968980650392258b91aaf17a57122725d7bb
-
SSDEEP
96:XRK1hXb/6qG++Kn/lGIMyysSDpQDiPTgWYT05IMHy0M:sXrtp+OslBDgiPTgVTJMq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1942.exe
Files
-
1942.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ