Static task
static1
Behavioral task
behavioral1
Sample
e8f8905411dd9becb8c5a4b1d4386e0b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e8f8905411dd9becb8c5a4b1d4386e0b.exe
Resource
win10v2004-20231215-en
General
-
Target
e8f8905411dd9becb8c5a4b1d4386e0b.exe
-
Size
1.2MB
-
MD5
e8f8905411dd9becb8c5a4b1d4386e0b
-
SHA1
5821450bc0630499a14a320e51265859ac9d11bf
-
SHA256
9933984e5c199511dc2e7f2058842a1365b575013b7a956743dedcb59c057566
-
SHA512
35138322119360fa5bd69e7e27e0f3465cced1302491b9c63171c9c21b8031822aa166eb5b451409b81c369ef584d747472efb7a2f8cd4c03a7e407e4889fc18
-
SSDEEP
24576:4eUj8wAR6W8quIIgm5BaVQNBuP8VXMy/ZDvxuHbZQ70t2wb9+DsBS3g1mrVap70z:KD0N8quIs5BaVQNBuP8VXMy/ZDvxuHbJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e8f8905411dd9becb8c5a4b1d4386e0b.exe
Files
-
e8f8905411dd9becb8c5a4b1d4386e0b.exe.exe windows:4 windows x86 arch:x86
15e5b7e387d3e2b2ed44fd1b22537312
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalReAlloc
GetTempPathA
GlobalAlloc
WriteFile
CloseHandle
GetFileType
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
CreateProcessA
GlobalFree
lstrlenA
ExitProcess
FreeLibrary
FreeEnvironmentStringsA
CreateDirectoryA
LoadLibraryA
GetWindowsDirectoryA
DeleteFileA
GetExitCodeProcess
Sleep
GetCurrentDirectoryA
GetCommandLineA
GetEnvironmentStrings
GetSystemInfo
AreFileApisANSI
GetVersionExA
ReadFile
SetFilePointer
GetFileSize
WideCharToMultiByte
MultiByteToWideChar
GetTickCount
user32
wsprintfA
shell32
ShellExecuteExA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ