Static task
static1
Behavioral task
behavioral1
Sample
4ecc40ae6b5d32fc924440341560c436.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ecc40ae6b5d32fc924440341560c436.exe
Resource
win10v2004-20231215-en
General
-
Target
4ecc40ae6b5d32fc924440341560c436
-
Size
132KB
-
MD5
4ecc40ae6b5d32fc924440341560c436
-
SHA1
ce0cdad66d16cf3bbb262a8d1997b4175fc97670
-
SHA256
cfea047590addcfd30602ada7da7e3b02ac3cf14f7f2423677e10d589be724fc
-
SHA512
39d3043d8ee599bab53a39cf9ff7298830e9ae552add1b33a54e8667e71cac7e31d776148a491030cd829c06ca3e74347953d1aff11e932a469ccbb88159b174
-
SSDEEP
1536:34L3magEJh2WpC2w777IMoC2fTZwG1zUC/Z9V4jvLJHorGQsS4Iigz0ZXFgUwz8:oL2UgWpC2kwC2fmezhZ9V4jvNEGQc3L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ecc40ae6b5d32fc924440341560c436
Files
-
4ecc40ae6b5d32fc924440341560c436.exe windows:4 windows x86 arch:x86
c328cdc8ee57180194095b8ca5638cfc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadHugeReadPtr
GetOEMCP
lstrcmpA
FlushFileBuffers
GetProcAddress
ExitProcess
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
data Size: 8KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ