Static task
static1
Behavioral task
behavioral1
Sample
2813182ff0fe9aac04061ae34e50e46a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2813182ff0fe9aac04061ae34e50e46a.exe
Resource
win10v2004-20231215-en
General
-
Target
2813182ff0fe9aac04061ae34e50e46a
-
Size
169KB
-
MD5
2813182ff0fe9aac04061ae34e50e46a
-
SHA1
87582d30f52ff4cba32cfc7cc61c932abc07c35d
-
SHA256
e433c6107142cc43423215d77370bee93681a3aeb3621732639e522e2bf13dd7
-
SHA512
bdda66422711b1aca6e263511de3e35b6acb9f66bdce69b8b2ebb431187227d286777ffe2249c1d6244cb114ce8cc4a3680b085698e58df6f6a2f686d7b00722
-
SSDEEP
3072:3R6+m9GQe33q0bWE9D/HC1duZVIq5DgsKJpQohPAoXCYhI/Oua6H1yCSzAmZoa3w:3Rlm9je33/bWE9Da1dAVI4D6QKAgS/59
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2813182ff0fe9aac04061ae34e50e46a
Files
-
2813182ff0fe9aac04061ae34e50e46a.exe windows:4 windows x86 arch:x86
59aa3f0d4aeb2a5c3f2d64b7f5194e9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
FreeEnvironmentStringsA
ReadFile
WideCharToMultiByte
AddAtomW
LCMapStringW
GetCPInfo
FlushFileBuffers
FreeEnvironmentStringsW
FindFirstFileA
IsBadCodePtr
GetFileAttributesA
GetOEMCP
EnumResourceNamesA
LCMapStringA
GetEnvironmentStrings
UnhandledExceptionFilter
WriteFile
GetThreadLocale
GetStringTypeW
GetDiskFreeSpaceA
SetUnhandledExceptionFilter
IsBadReadPtr
GetStringTypeExA
VirtualProtect
GetStringTypeA
SetFilePointer
SetStdHandle
GetEnvironmentStringsW
GetFullPathNameA
MulDiv
shlwapi
SHGetInverseCMAP
PathIsContentTypeA
PathIsFileSpecA
SHCreateStreamOnFileEx
PathAppendA
PathCreateFromUrlW
rpcrt4
RpcStringFreeA
Sections
.text Size: 90KB - Virtual size: 490KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ