Static task
static1
Behavioral task
behavioral1
Sample
55c9868b0846af29e9eefe1df24bc2e0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55c9868b0846af29e9eefe1df24bc2e0.exe
Resource
win10v2004-20231215-en
General
-
Target
55c9868b0846af29e9eefe1df24bc2e0
-
Size
22KB
-
MD5
55c9868b0846af29e9eefe1df24bc2e0
-
SHA1
f1140054f3f707846c44592dd0814e0891d1a629
-
SHA256
3bd131abafda2e48cceba687a89ccd740d676dc347dabccb1d5afffc586d47ca
-
SHA512
a0d578e5b5a2be0138b3d43fd50e08924945d5dc825179e6bad994d2e33a11506e223a4c260b1687ed0b0a95a39993de4934ae2bbfc2d0a953d7d222c38f2d71
-
SSDEEP
384:5MHO3DUH3Privk6AQGoc6WPJ3X4uhboTdrGWqRP31ll6RwRrS:5MuTUH/ri86AQG7TZhUTdpqd31b6RGrS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55c9868b0846af29e9eefe1df24bc2e0
Files
-
55c9868b0846af29e9eefe1df24bc2e0.exe windows:4 windows x86 arch:x86
b7ac57d17c948321cb90d09db6cde9fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LocalAlloc
GetModuleFileNameA
GetModuleHandleA
ContinueDebugEvent
IsDebuggerPresent
WaitForDebugEvent
CheckRemoteDebuggerPresent
lstrcmpA
LocalFree
lstrlenA
lstrcpyA
GetCurrentProcess
CreateProcessA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlUnwind
Sections
.f0Gx Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ