Static task
static1
Behavioral task
behavioral1
Sample
41b63203e2c5260de737b950c3d01462.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41b63203e2c5260de737b950c3d01462.exe
Resource
win10v2004-20231222-en
General
-
Target
41b63203e2c5260de737b950c3d01462
-
Size
76KB
-
MD5
41b63203e2c5260de737b950c3d01462
-
SHA1
2eb31fdaf488c39eaec5cf2540182520761e0317
-
SHA256
32cde180072588cf623c5b6865d8e7121e092e15774427d267039c66c93947c9
-
SHA512
70e03347e8d030a4caf8ce5aedb22a9e3c06be5c8350f99efa1e89e9fe1e140c8439b66ece6ae9c97c3e8bf8eaf4dae6b7e6363f0ea5683e2e6416b2371fa98a
-
SSDEEP
1536:VEfinrl/p30WiWz7RA/g1VjNv2HprdapjVrs2ryrd1vUQuq6:VoOl/p30q9AI1VZvQpcHs2qo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41b63203e2c5260de737b950c3d01462
Files
-
41b63203e2c5260de737b950c3d01462.exe windows:4 windows x86 arch:x86
1717e37d5c1cb88583e041ac402f16b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextVolumeMountPointW
SetStdHandle
TryEnterCriticalSection
GetProcessIoCounters
GlobalGetAtomNameW
EnumUILanguagesA
DeleteFileA
GetComputerNameExW
GetModuleFileNameW
UpdateResourceA
FindFirstVolumeA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE