Static task
static1
Behavioral task
behavioral1
Sample
c381a0b4fb7e09ebd16ba605fee94cd0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c381a0b4fb7e09ebd16ba605fee94cd0.exe
Resource
win10v2004-20240226-en
General
-
Target
c381a0b4fb7e09ebd16ba605fee94cd0
-
Size
33KB
-
MD5
c381a0b4fb7e09ebd16ba605fee94cd0
-
SHA1
34eaf7006436a37ac3c9180a4c724592dad22c1c
-
SHA256
b373e4dd5e15fff86953e63a304be93fc45c417585b7d0d48753bdef69befeea
-
SHA512
667e5d4fe5b47eefd978c32078898edeaccebaeb631489c6934256b84ab3f588aedcfd1b7a3301c782cb73af3dd1a16061641b237b9c86d3163c687571d3037f
-
SSDEEP
768:tQNODzwrwRfoeQy+D4+NzGMHHC56/Eu3+2U8hb1r:FDErMf7X2z5H06/5O2UA1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c381a0b4fb7e09ebd16ba605fee94cd0
Files
-
c381a0b4fb7e09ebd16ba605fee94cd0.exe windows:4 windows x86 arch:x86
fce7809a30096dee5d325be7178490ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
Sleep
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ