Static task
static1
Behavioral task
behavioral1
Sample
4e6e6b463dfeeee3beee7204fae62e44.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e6e6b463dfeeee3beee7204fae62e44.exe
Resource
win10v2004-20231222-en
General
-
Target
4e6e6b463dfeeee3beee7204fae62e44
-
Size
522KB
-
MD5
4e6e6b463dfeeee3beee7204fae62e44
-
SHA1
1d6baaff2eb3af7f4ed1156c0bca0079b8a38777
-
SHA256
0b6b530f0c731047e7b168a08b211731fbd6d2bfac55bb4c2c53f92831aec48d
-
SHA512
7c38f40fbf5d0760f9e49987afae95e10f2832002dd7645adccc92523ec15419f9ab3b470dd5f0533f6d7c15f0dbda7323d23cad9026c36ef39b1ebe2c43404c
-
SSDEEP
12288:UpA1asR01a5uPTwilU83TV+uUs9ul/TqRTbP/t80AIMb:UpjsR01aqTnP3hK97IbP/RAnb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e6e6b463dfeeee3beee7204fae62e44
Files
-
4e6e6b463dfeeee3beee7204fae62e44.exe windows:4 windows x86 arch:x86
00371999eaf321d7c06b2b5958a1bf8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
realloc
free
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
VirtualAlloc
VirtualFree
VirtualProtect
LoadLibraryA
GetProcAddress
IsBadReadPtr
GetProcessHeap
HeapAlloc
FreeLibrary
HeapFree
CloseHandle
Sections
.code Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 506KB - Virtual size: 506KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ