Static task
static1
Behavioral task
behavioral1
Sample
c03ae08fb36c0624f2c3548f545a1644.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c03ae08fb36c0624f2c3548f545a1644.exe
Resource
win10v2004-20240226-en
General
-
Target
c03ae08fb36c0624f2c3548f545a1644
-
Size
4KB
-
MD5
c03ae08fb36c0624f2c3548f545a1644
-
SHA1
ffef962d4c8d44b609f3804ecdc92fedaac66a0d
-
SHA256
445f75ba4730ff167bc4b8be53fa59596190885df777c22489fa6e861621df30
-
SHA512
534a6b2d0df58adb76c3e7bf444801337f80e6ec7c96b8405210a4f141da697bc69f59b6c3bd3fd9af31fe70d77065ce01a403d7663b4a29b4f273e081d74b6d
-
SSDEEP
96:0GF6/6/LDUzdi8//e5GDIUKkzZduyckhRL:0GFGPzddaGMU/zZd3cMRL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c03ae08fb36c0624f2c3548f545a1644
Files
-
c03ae08fb36c0624f2c3548f545a1644.exe windows:4 windows x86 arch:x86
a608bdcc6742b4e7b100b2e6d7f6b63e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
CopyFileA
CreateFileA
DeleteFileA
ExitProcess
FindResourceA
GetCommandLineA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
LoadResource
LockResource
OpenProcess
SizeofResource
WaitForSingleObject
WriteFile
WriteProcessMemory
lstrcatA
lstrcmpiA
VirtualFree
VirtualAlloc
ReadProcessMemory
GetCurrentProcessId
CreateRemoteThread
SetLastError
ResumeThread
user32
FindWindowA
wsprintfA
GetWindowThreadProcessId
shell32
ShellExecuteA
Sections
.text Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RT Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 940B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE