Static task
static1
Behavioral task
behavioral1
Sample
PED.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
PED.exe
Resource
win10v2004-20231020-en
General
-
Target
PED.exe
-
Size
80KB
-
MD5
2aaf5f95405afe1d0cb847a713e3e772
-
SHA1
134513d1b8f935cd2f53add47d69c6d9d07d6ba7
-
SHA256
11b07270d967fb07c448a46e4da8c4264a75d79a7dc4d6416c6d57a9b1f9fe0a
-
SHA512
0ed0e432ea15afae047bc7c5370e9d217a7227bee526323bc9211733e9b397cce1ff0a76444e36cde102c5e237f6b3b634a1c8f573bcce413446b9216f966011
-
SSDEEP
768:Sq+z8//svObW3jxfhzSincZ9K9I4fV8RWotuze7vSZu2OuZBz+UZ23:SQ//ziDa9SI4fVroOCvQTY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource PED.exe
Files
-
PED.exe.exe windows:4 windows x86
55c8f402785fc11fbd954a39102eacb1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileA
MapViewOfFile
CreateFileMappingA
GetLastError
CreateFileA
CloseHandle
UnmapViewOfFile
IsBadReadPtr
FormatMessageA
GetCommandLineA
GetVersion
ExitProcess
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
LCMapStringA
LCMapStringW
SetFilePointer
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
SetStdHandle
FlushFileBuffers
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE