Static task
static1
Behavioral task
behavioral1
Sample
1e4f3388ec39eda9d254a63b4be5baca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e4f3388ec39eda9d254a63b4be5baca.exe
Resource
win10v2004-20231215-en
General
-
Target
1e4f3388ec39eda9d254a63b4be5baca
-
Size
27KB
-
MD5
1e4f3388ec39eda9d254a63b4be5baca
-
SHA1
92f5647173305104c3bccba0eec76e5950206011
-
SHA256
6ca82723010f7c963aa806d1f33cf47828cf2e662ac156bec597205ca6b6299c
-
SHA512
307bb6912f2e87e16a31ecf0b4fadce306624a982a93fd2eb7f0c18adf59fb4ac7e0312b568079f72d540a15ed56a7591c27f13660f54eddd5b82931498aba40
-
SSDEEP
384:gPdrMlxVwyILIqffH3QzBkR8c4Hg1K/sCvX6oTJpxOWMHA:Ad4hwyIFXH3QzBAF4AkbXVDwD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e4f3388ec39eda9d254a63b4be5baca
Files
-
1e4f3388ec39eda9d254a63b4be5baca.exe windows:4 windows x86 arch:x86
ef874031908b05bd62be4f22fecdeb58
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
EnumDateFormatsExA
GetFullPathNameA
EnumSystemCodePagesA
EndUpdateResourceW
GetSystemDirectoryA
CreateFileMappingW
user32
CreateWindowStationA
LoadBitmapA
LoadCursorFromFileA
IMPSetIMEA
CharToOemA
gdi32
GetCharWidthFloatA
GetTextFaceA
CreateFontA
EnumFontFamiliesA
GetCharWidth32A
Sections
.share Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.icode Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 906B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.icode Size: 1024B - Virtual size: 605B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ