Static task
static1
Behavioral task
behavioral1
Sample
45eb71d99c190c00c16783950358756e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45eb71d99c190c00c16783950358756e.exe
Resource
win10v2004-20231215-en
General
-
Target
45eb71d99c190c00c16783950358756e
-
Size
22KB
-
MD5
45eb71d99c190c00c16783950358756e
-
SHA1
4bb01ad6b4dcb3054c1713790b2682a2569e9cf5
-
SHA256
926370f1ce087947474049990c30ac1a02b3cb3b824b8e02876b9862d300e8d3
-
SHA512
812ae0d088404e79060a92c43b1fc6cadaa633ba25bc34cfa8c2dbc40dddd06f2263bd03209493c2841623c083605515b88ee84e8de989332fbd19f97f26d3e7
-
SSDEEP
384:3Gmmcn5z3JBDyS6Z820eJxnKq1a1mAk3siDy/NyO3j4o3Zy3PrRJjmN:3iwtJBGd8besq1nAk3uNyO3j4opQRJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45eb71d99c190c00c16783950358756e
Files
-
45eb71d99c190c00c16783950358756e.exe windows:4 windows x86 arch:x86
7618e3b2936b71fece428a4ac7435dbf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtectEx
WriteProcessMemory
GetThreadContext
SetThreadContext
LoadLibraryA
CreateProcessA
GetCommandLineA
GetProcAddress
ResumeThread
gdi32
CreateDCA
Sections
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE