Static task
static1
Behavioral task
behavioral1
Sample
cd8bb3ec79c567ba99d526f2c48b8a1a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd8bb3ec79c567ba99d526f2c48b8a1a.exe
Resource
win10v2004-20240226-en
General
-
Target
cd8bb3ec79c567ba99d526f2c48b8a1a
-
Size
20KB
-
MD5
cd8bb3ec79c567ba99d526f2c48b8a1a
-
SHA1
6c4ccaa9b52142282c4bcca471218930d8cd375a
-
SHA256
eed7016ab67bc884ac7015f7e39353aea74d4fc66c97f4cb81fef688f407ef89
-
SHA512
a0ea7e4a1675d42e64cbb8616fd53e1fc77a10e9d094bdd9b4e6a24e24f3344db2523b3136ec6c4ce43c5687ad373c14553bff27a98792502dfe8d3d9337e94b
-
SSDEEP
384:nWn9PMRxJYeDWj66R04oNCCrsEajK3tQV/w7ct8EItKIe+ulnfWjvOeo:nEWJYeDY66qk/ItQ27ctot5ebln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cd8bb3ec79c567ba99d526f2c48b8a1a
Files
-
cd8bb3ec79c567ba99d526f2c48b8a1a.exe windows:4 windows x86 arch:x86
0b5e1c7498b7b9d89251c5db5ca7c1f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetFileAttributesA
GetTempPathA
lstrcpyA
CloseHandle
lstrcatA
WaitForSingleObject
ResetEvent
WriteFile
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
SetEvent
LoadLibraryA
ExitProcess
GetModuleHandleA
CreateEventA
GetProcAddress
RtlUnwind
CreateThread
ExitThread
GetVersionExA
user32
wsprintfA
DispatchMessageA
SetThreadDesktop
ShowWindow
PeekMessageA
CreateWindowExA
CreateDesktopA
MsgWaitForMultipleObjects
DestroyWindow
CharToOemA
GetDesktopWindow
IsWindow
TranslateMessage
advapi32
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ