Static task
static1
Behavioral task
behavioral1
Sample
b5d8cb4df20663d7459a938fe776c16a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5d8cb4df20663d7459a938fe776c16a.exe
Resource
win10v2004-20240226-en
General
-
Target
b5d8cb4df20663d7459a938fe776c16a
-
Size
12KB
-
MD5
b5d8cb4df20663d7459a938fe776c16a
-
SHA1
c2cc7e71648a8056be8d967e6b8b0a172707bef7
-
SHA256
e6b7e29ff178b1ff6a4bfd61cab53ef130915074b3acad3679171b081955c0e6
-
SHA512
34a24674bb6c6addb700024b3549557e7b3ba78a27894fab74ee909fb6e3dbc5b21df620b81fdd7a139a9a9640442165d1d62a2bd0ad51abf90f3d80946bdb5e
-
SSDEEP
192:32H+V+cXezw8GxzF6/eqVee6JtmQe/Ifi4fcTc:i+IcXeULdgeszQrfi4fc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5d8cb4df20663d7459a938fe776c16a
Files
-
b5d8cb4df20663d7459a938fe776c16a.exe windows:4 windows x86 arch:x86
3eb6999d1b3911e1671ef1523874f5b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
ExitProcess
FindResourceA
FreeResource
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
GlobalAlloc
LoadResource
CreateMutexA
ReleaseMutex
RtlMoveMemory
RtlZeroMemory
SetFilePointer
SizeofResource
WinExec
WriteFile
lstrcatA
lstrcmpiA
lstrlenA
CreateFileA
CopyFileA
LockResource
CloseHandle
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
advapi32
RegCreateKeyA
RegSetValueExA
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NewSec Size: 256B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE