Static task
static1
Behavioral task
behavioral1
Sample
b54213caac71474b639c471208a3c277.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b54213caac71474b639c471208a3c277.exe
Resource
win10v2004-20240226-en
General
-
Target
b54213caac71474b639c471208a3c277
-
Size
32KB
-
MD5
b54213caac71474b639c471208a3c277
-
SHA1
5b83f3af0d3d82e2c148d21964fba7ff4b1ccc60
-
SHA256
d3ab28ecab333edbff8b92129b90e90a80be6afca86022e59c4d62d3b25c1be0
-
SHA512
e2503d172cf1eec2e0fab8aa37c1dc1ce9b4fd9f7b2fb6b4c1f3434109476691be90e53bceedbeb8bb3953aadb4005065c84f788b6305e182736ee8ad2cdb094
-
SSDEEP
768:hrzkrZc+hYru8Lp4D2cMu5ZzjQ/XVdRJoJhhjYCwyYci:hs9hYrVLp4qcRjQ/XVdRJ6ECw4i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b54213caac71474b639c471208a3c277
Files
-
b54213caac71474b639c471208a3c277.exe windows:4 windows x86 arch:x86
e95e3c19c1b1846eddfe9b97188d572c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
CreateProcessW
DeleteFileA
ExitProcess
GetCommandLineW
GetModuleFileNameA
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
HeapAlloc
ReadFile
SetFileAttributesA
SetFilePointer
WriteFile
ntdll
NtFlushInstructionCache
NtOpenKey
NtProtectVirtualMemory
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE