Static task
static1
Behavioral task
behavioral1
Sample
c1443440ed5c85890d26e049d4b432ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1443440ed5c85890d26e049d4b432ad.exe
Resource
win10v2004-20240226-en
General
-
Target
c1443440ed5c85890d26e049d4b432ad
-
Size
8KB
-
MD5
c1443440ed5c85890d26e049d4b432ad
-
SHA1
20d87e22d98057f569f6c8763028d4b8545c7e88
-
SHA256
94cbbe1073025051fb9854d6687c6263ae9db5fa33b1c74d6a20888eab122fb8
-
SHA512
a1fb30d968e76ef6185fda819085d0194ae6e4ca6123e605bafcafd81558559b30f27efe74a9e43428d3b4697b35f8d2e0e88230fb6596ccdcd32aec4fa310a8
-
SSDEEP
48:OEPa2KbjRhpFAeIfBOXKBgvdZoEs0JBPy:nPa2KbVhgeEPKleQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1443440ed5c85890d26e049d4b432ad
Files
-
c1443440ed5c85890d26e049d4b432ad.exe windows:1 windows x86 arch:x86
1645ab5844541803487327c2fde43e4c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
FindFirstFileA
GetSystemTime
CopyFileA
GlobalAlloc
GetCommandLineA
ExitProcess
CreateProcessA
GlobalLock
FindNextFileA
GlobalUnlock
MoveFileA
SetCurrentDirectoryA
lstrcpyA
GetCurrentDirectoryA
user32
CloseClipboard
SetClipboardData
OpenClipboard
MessageBoxA
ExitWindowsEx
EmptyClipboard
Sections
CODE Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ