Static task
static1
Behavioral task
behavioral1
Sample
be4f3013fe01ceb2fcad5802a33ed3aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
be4f3013fe01ceb2fcad5802a33ed3aa.exe
Resource
win10v2004-20240226-en
General
-
Target
be4f3013fe01ceb2fcad5802a33ed3aa
-
Size
22KB
-
MD5
be4f3013fe01ceb2fcad5802a33ed3aa
-
SHA1
801934eff1078d15286f5ec059c9586522b0e29e
-
SHA256
e3c6a59529cb5ee7939e34b62ec9ea8c316d7c90cbe533dc50cc846aa1361aca
-
SHA512
e91c2f984f1c379b2acf4177cfcf0757915bef8fb8cf40e942b6fc0091151c18eecd09a1ab299005e4ce858cd8d46bfe958b1c453d59f6b89abff837d6ba0d8b
-
SSDEEP
384:px1CvpjhhIVzEDYx8bFz1oMItsHDTrr/I8iv:pywE48bV11ItarbIB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be4f3013fe01ceb2fcad5802a33ed3aa
Files
-
be4f3013fe01ceb2fcad5802a33ed3aa.exe windows:1 windows x86 arch:x86
2b7e7cfe8d6b1568f9dd28bda103c9e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharUpperA
kernel32
CloseHandle
CreateEventA
CreateFileA
ExitProcess
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetCurrentThreadId
GetEnvironmentStringsA
GetFileSize
GetFileType
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetOEMCP
GetProcAddress
GetStdHandle
GetVersion
LoadLibraryA
MoveFileA
MultiByteToWideChar
ReadFile
SetConsoleCtrlHandler
SetEnvironmentVariableA
SetEnvironmentVariableW
SetFileAttributesA
SetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
Sections
AUTO Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DGROUP Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ