Static task
static1
Behavioral task
behavioral1
Sample
cb5ada85d19a6ec30d8a0e30ad766ce7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb5ada85d19a6ec30d8a0e30ad766ce7.exe
Resource
win10v2004-20240226-en
General
-
Target
cb5ada85d19a6ec30d8a0e30ad766ce7
-
Size
14KB
-
MD5
cb5ada85d19a6ec30d8a0e30ad766ce7
-
SHA1
e59d7dbc2e674b99157a2fff9e67a1d74e8d7adf
-
SHA256
5339e7a7dcf0bb892f91e4bcd3c6cbe66f0cd7cbcdcfc64dac4508c63180f44c
-
SHA512
2cb3d0befa12592bd7a04679b7038c90288ec75e5b585517cd5daccae2683b9d302d6f31b1495722571fe83457922ebac56ce0157768a051337a19a8cd93b721
-
SSDEEP
192:E/9wAf/eMPxv1Rcy2AeCmefm9TTyYoBwAGs872qNLcUjwacbK:Hod1R4ACnyYoAZ2Qcb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb5ada85d19a6ec30d8a0e30ad766ce7
Files
-
cb5ada85d19a6ec30d8a0e30ad766ce7.exe windows:1 windows x86 arch:x86
83405a5f2cc1dbf6b3a809528f84a9e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
CreateProcessA
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
GetFileAttributesA
GetFileTime
GetModuleFileNameA
GetShortPathNameA
GetStartupInfoA
GetTempFileNameA
GetTempPathA
GlobalAlloc
GlobalFree
MoveFileA
MoveFileExA
SetFileTime
WaitForSingleObject
WinExec
WriteFile
lstrcatA
user32
CreateDesktopA
EnumWindows
FindWindowA
GetMessageA
PostQuitMessage
advapi32
RegOpenKeyA
Sections
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 818B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE