Static task
static1
Behavioral task
behavioral1
Sample
1d20019409d0e65c0cd8d3627e480980.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d20019409d0e65c0cd8d3627e480980.exe
Resource
win10v2004-20231222-en
General
-
Target
1d20019409d0e65c0cd8d3627e480980
-
Size
150KB
-
MD5
1d20019409d0e65c0cd8d3627e480980
-
SHA1
c1a8b575842334ac6f44fa3d13ba98135bfcb555
-
SHA256
c1b30578ed79edb80aa3a598cedbaea4fb1b43e37bd0301182d62bd1dae498e5
-
SHA512
edd2fef36ef8e17d53cb46ba420ae32aad362803bd91db6a6fc593b76d2c3213b4439be98433b1fdc4e76a2083bf680034d5f5c92baf44bd8d7730695103409c
-
SSDEEP
3072:HtDM8zut/AAAAApjfHYSKmMyFtJ3qERVgUNZvRSRkyIkbiPUP45lxeV:HMAAAAAZ0yFraEPgaZA+D8P4wV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1d20019409d0e65c0cd8d3627e480980
Files
-
1d20019409d0e65c0cd8d3627e480980.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2ggjsf.n Size: - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9x22pmpe Size: 121KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5fbl9v3q Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ