Static task
static1
Behavioral task
behavioral1
Sample
452f3f360619951a45c250759db57700.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
452f3f360619951a45c250759db57700.exe
Resource
win10v2004-20231215-en
General
-
Target
452f3f360619951a45c250759db57700
-
Size
17KB
-
MD5
452f3f360619951a45c250759db57700
-
SHA1
9c94e629853e3c2b29aa245e1ff7a98452a4c02e
-
SHA256
8270305a240d447c3637f2fafe0d49a0698481a30cee5d09470213860fe34d33
-
SHA512
254c0772209d3b0f29076469cf00129c29852a4d24dedfdb20a06fca1201ce53636646874d35ef43966dba5f457680f3e58db7c41937d7f6501bf4b42a85eb27
-
SSDEEP
384:dA4nLg/F+GyqxiZ2xGLAW0Kf3WwhW4GZipCtp:dAi0Ny+xGEXKPWws8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 452f3f360619951a45c250759db57700
Files
-
452f3f360619951a45c250759db57700.exe windows:5 windows x86 arch:x86
d1fc65f3e7f0724b15147d8dda143509
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
RtlUnwind
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
user32
LoadIconW
advapi32
RegOpenKeyA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 542B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 920B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ