Static task
static1
Behavioral task
behavioral1
Sample
ad46474f1810014908298cffddaa5374.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad46474f1810014908298cffddaa5374.exe
Resource
win10v2004-20240226-en
General
-
Target
ad46474f1810014908298cffddaa5374
-
Size
24KB
-
MD5
ad46474f1810014908298cffddaa5374
-
SHA1
fa81395a232f2956b2e8322d77f09e5e59728c44
-
SHA256
32de026ccd98a60e774627763d6fc32cc05bd89bbc7dce0566778999acf54e17
-
SHA512
d8b2d2a0cdcebda6fe45cd726090097ae5d13951d4a0c08e7f6c0644468d06111b078bab684b3fd03d6a514edaa46776846022c72e2b4e7186b6a214fcf51e1f
-
SSDEEP
192:xFpiAY+jWG5kluNqtJ8NMkJxL+xuExP1oyhpDKQ9Z1:xXiLp0coHnAui1RD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad46474f1810014908298cffddaa5374
Files
-
ad46474f1810014908298cffddaa5374.exe windows:4 windows x86 arch:x86
a12c0fddbd24f8dc2dda4eb9327363d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
CloseHandle
CreateProcessA
MoveFileA
DeleteFileA
WriteFile
CreateFileA
Sleep
GetProcAddress
LoadLibraryA
FreeLibrary
GetWindowsDirectoryA
GetLongPathNameA
GetTempPathA
GetModuleHandleA
GetStartupInfoA
msvcrt
srand
time
__CxxFrameHandler
_access
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
atol
strstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
rand
_except_handler3
_itoa
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ