Static task
static1
Behavioral task
behavioral1
Sample
ac3f58192fa24972611e2b28a7191d4e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ac3f58192fa24972611e2b28a7191d4e.exe
Resource
win10v2004-20240226-en
General
-
Target
ac3f58192fa24972611e2b28a7191d4e
-
Size
16KB
-
MD5
ac3f58192fa24972611e2b28a7191d4e
-
SHA1
91901789fcdc1c2f91d92c6c58b9bc959b9475f0
-
SHA256
7bfd20eea1be24aa7522ec8931210185bc611a95c6b96627fea66b9c5798cefa
-
SHA512
7754e79061152e56c0efae15616f6bfbadceb45a85ecbaa9c329483a38ec158a2bbabab3a47dbb2c90cb1ee2c4b523651224fb8988351963fb3a080e0bdb16ba
-
SSDEEP
384:GX6l2Iw9jm5+ahHu1rxIKYBR28fAABb4ab:G2VcCxHu1rxJYP94a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac3f58192fa24972611e2b28a7191d4e
Files
-
ac3f58192fa24972611e2b28a7191d4e.exe windows:4 windows x86 arch:x86
87604b9ea833c4483b73cd954f8f2f9a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetCurrentThread
VirtualQuery
VirtualProtectEx
ExitProcess
ntdll
NtReadFile
user32
DestroyCaret
GetActiveWindow
Sections
.ntext Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.cqahwd Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bpkkhq Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tdata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ