Static task
static1
Behavioral task
behavioral1
Sample
1b29108b540885b3d3cca22871263ba2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b29108b540885b3d3cca22871263ba2.exe
Resource
win10v2004-20231215-en
General
-
Target
1b29108b540885b3d3cca22871263ba2
-
Size
348KB
-
MD5
1b29108b540885b3d3cca22871263ba2
-
SHA1
36aec3bff95a5c9dd49570019e020ecfbdec3421
-
SHA256
183c3f1978d928c45543c06b89266923ac8c75cc88a9e9e64059365ff4dc123b
-
SHA512
125adb8d3c91baae5da123a5cd2527fcdde280c5550c4dfc46d840db44cf7280e8e10431f4466a2975ba64172abdb18e5319be1221882e90a49b9f5d754d813d
-
SSDEEP
6144:ZBMIkVCUU+3XMa2Sa2uUGnLFM+9Adf8gdHnYwn4n45NX901glI2l/tA:LrUr1JXSSFf8gxY0lNX9SQl/W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b29108b540885b3d3cca22871263ba2
Files
-
1b29108b540885b3d3cca22871263ba2.exe windows:4 windows x86 arch:x86
b7ac57d17c948321cb90d09db6cde9fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LocalAlloc
GetModuleFileNameA
GetModuleHandleA
ContinueDebugEvent
IsDebuggerPresent
WaitForDebugEvent
CheckRemoteDebuggerPresent
lstrcmpA
LocalFree
lstrlenA
lstrcpyA
GetCurrentProcess
CreateProcessA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
Sections
.f0Gx Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 339KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ