Static task
static1
Behavioral task
behavioral1
Sample
5c50d433c2d409dfdc81d89d75ae77a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c50d433c2d409dfdc81d89d75ae77a7.exe
Resource
win10v2004-20231222-en
General
-
Target
5c50d433c2d409dfdc81d89d75ae77a7
-
Size
3KB
-
MD5
5c50d433c2d409dfdc81d89d75ae77a7
-
SHA1
9f18f5c48054b3bf0880856c9d590b614383bca7
-
SHA256
d889820449205ccecf49c52fd1a27e4b9d407618bb41fefb27eb3c065d3ca3a3
-
SHA512
97638a8d838d31c02cef1698d9044179b4c5ead148ee2100329b155a97c5326391f627daf5268eecff12b6f3e92d62860ab0bf501da6a8bf6892e123f5a805e1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c50d433c2d409dfdc81d89d75ae77a7
Files
-
5c50d433c2d409dfdc81d89d75ae77a7.exe windows:4 windows x86 arch:x86
c8dca2bc0a566c3fd51d0edb66a58992
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetProcAddress
CreateRemoteThread
OpenFile
ReadFile
WriteFile
WriteProcessMemory
lstrlenA
LoadLibraryA
CreateProcessA
wsock32
send
connect
closesocket
recv
socket
gethostbyname
advapi32
RegSetValueExA
user32
wsprintfA
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE