Static task
static1
Behavioral task
behavioral1
Sample
1e3dfa8a5d968a592ac17a967d584e98.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e3dfa8a5d968a592ac17a967d584e98.exe
Resource
win10v2004-20231222-en
General
-
Target
1e3dfa8a5d968a592ac17a967d584e98
-
Size
8KB
-
MD5
1e3dfa8a5d968a592ac17a967d584e98
-
SHA1
31ebbbddec7ce87e573e74702d84284298b22ae5
-
SHA256
fe75ff15e1d1dff0168be602d66452dc72a29662da7f6471279daef61f252e85
-
SHA512
9e1fbabeb492c97f0297b36deae06c01bbb1b91d426bf92beeaf022f9d8b3468eaeca3b40f62d9fc609ba8ce9630d7154ee3402c2271b833713985ad1be150c5
-
SSDEEP
192:Yd+qX14/51DWHwHVSGq14KUHj1Zh2DJ8As:YIqq51DWHwH7OJuj1v2DJ8/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e3dfa8a5d968a592ac17a967d584e98
Files
-
1e3dfa8a5d968a592ac17a967d584e98.exe windows:4 windows x86 arch:x86
fce7809a30096dee5d325be7178490ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
Sleep
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ