Static task
static1
Behavioral task
behavioral1
Sample
40ab235a53f92b815ec264abc0ea48d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40ab235a53f92b815ec264abc0ea48d4.exe
Resource
win10v2004-20231215-en
General
-
Target
40ab235a53f92b815ec264abc0ea48d4
-
Size
199KB
-
MD5
40ab235a53f92b815ec264abc0ea48d4
-
SHA1
9e38612befc7cb2bfb2421b5f9dd231a4f6a0f15
-
SHA256
58ff20db55f8572ebe45a85f5f268c49304fa3fc6330786d5f1248ff34816abd
-
SHA512
56825dd6ceef208ff3540fd324256ec21232214cb73b4d46fa6d406c77849a8bb528b4fb84460e93a124222319908ce7d20e8254cfa703dd2beb7890a4862f52
-
SSDEEP
3072:1ssgDnb1nUzJ78sqoyVSXtIfArk1F31zItGzaMi7a2b9nW8OmWY7uzsCW7vFm:1slnOzJ78sqlVSd81QYz67a2b881z1v8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40ab235a53f92b815ec264abc0ea48d4
Files
-
40ab235a53f92b815ec264abc0ea48d4.exe windows:4 windows x86 arch:x86
98dad6580caeeb29008b2dd63f61c862
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetModuleHandleA
LoadLibraryA
ExitProcess
user32
DrawMenuBar
Sections
.text Size: - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 64KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.perplex Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE