Static task
static1
Behavioral task
behavioral1
Sample
c41538b94a82d29d94aa7ee886fc2c42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c41538b94a82d29d94aa7ee886fc2c42.exe
Resource
win10v2004-20240226-en
General
-
Target
c41538b94a82d29d94aa7ee886fc2c42
-
Size
95KB
-
MD5
c41538b94a82d29d94aa7ee886fc2c42
-
SHA1
648b8cf0433c60eb0d3c73dfa861b99ebd222d4d
-
SHA256
eaf0ea212007a49968f52c0ea887463275487f4eefc6ffb04075bead07593ef3
-
SHA512
7239ec450a7d33eeffe3db0e14b347c71e8aacb67a86b082acc7935bb03d3e73cc5162663e3a027a7ecfbd387fef0d0739d1c64d24418e294f43782b644974d4
-
SSDEEP
1536:AnEKaMmLW4kJ4uHFnSkGPCLRQcFq2oSDtkpoaiI8aNCS46xLRdcBZ9LorpR:+a9KN4oFnSjPCtco6GI/46xlej9LoL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c41538b94a82d29d94aa7ee886fc2c42
Files
-
c41538b94a82d29d94aa7ee886fc2c42.exe windows:4 windows x86 arch:x86
afb1ed92102b757e36567a4fe18527cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
Sections
Size: 41KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 642KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 35KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE