Static task
static1
Behavioral task
behavioral1
Sample
1cdddc1b5f98eab8f6e26d38f05b663f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cdddc1b5f98eab8f6e26d38f05b663f.exe
Resource
win10v2004-20231215-en
General
-
Target
1cdddc1b5f98eab8f6e26d38f05b663f
-
Size
7KB
-
MD5
1cdddc1b5f98eab8f6e26d38f05b663f
-
SHA1
356d41982e950da716ca88a3522b0680b3bc9383
-
SHA256
453aea6f31eca7ac65da88917da880b4324ec305be1ac1e3ba910895f8eae672
-
SHA512
d39cf946ae5ebf6855d46b7d1fe743e7914651dc86f24db749840f9f91a54cc9e8ecff2d6fea3606736ec2d22e3392317667f6071236b8bb6aabc390c9fe085c
-
SSDEEP
48:9kHH6JZ+31ERbs+i4Bwvke68esI2bhXj2itrgyn7UjIkXVWBlqNh5Aj:9PZ+31iy/68esI2BaiSOIkISw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cdddc1b5f98eab8f6e26d38f05b663f
Files
-
1cdddc1b5f98eab8f6e26d38f05b663f.exe windows:1 windows x86 arch:x86
0e4021554a373d5cb9215de2f75bd91d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
WriteProcessMemory
TerminateProcess
ExitProcess
GetStartupInfoA
CreateProcessA
GetCommandLineA
GetCurrentProcess
ResumeThread
GetThreadContext
user32
MessageBoxA
Sections
code Size: 322B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
data Size: 220B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMPORTS Size: 66B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
imports Size: 392B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
relocs Size: 114B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
resource Size: 924B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ndata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE