Static task
static1
Behavioral task
behavioral1
Sample
57c469e57befb053625c6a8281a547ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57c469e57befb053625c6a8281a547ac.exe
Resource
win10v2004-20231215-en
General
-
Target
57c469e57befb053625c6a8281a547ac
-
Size
3KB
-
MD5
57c469e57befb053625c6a8281a547ac
-
SHA1
bf49ccef6e0847ae05906628e54109d3986b9dcd
-
SHA256
1566d41b307022826c9efb8bb7e62d345ee5155831e509a32b1cd1f246b1eea9
-
SHA512
7b6bdad4cc1a38a9dbac819ad8fe039ef22ed3b7b085b88498cb03656f939ee5f1bc45e7ee138b73fae38964788542d4f8a0ec9adc919e4266f6c859b5c0eb4c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57c469e57befb053625c6a8281a547ac
Files
-
57c469e57befb053625c6a8281a547ac.exe windows:4 windows x86 arch:x86
e0c05c4249918dfa89d8613ae99eea3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateRemoteThread
DeleteFileA
ExitProcess
ExitThread
GetModuleFileNameA
GetModuleHandleA
GetWindowsDirectoryA
LoadLibraryA
OpenProcess
VirtualAllocEx
VirtualFreeEx
WinExec
WriteProcessMemory
lstrcatA
lstrcmpA
user32
GetWindowThreadProcessId
FindWindowA
urlmon
URLDownloadToFileA
Sections
.text Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ