Static task
static1
Behavioral task
behavioral1
Sample
ce6de8599b565fddf67ee026ee4bc285.exe
Resource
win7-20240221-en
General
-
Target
ce6de8599b565fddf67ee026ee4bc285
-
Size
232KB
-
MD5
ce6de8599b565fddf67ee026ee4bc285
-
SHA1
a6045faafaecb660b65d45759b13a38ea2a7ce23
-
SHA256
427f8b826a8cc9e9059fcd956636a37a6aab8a3162b1ad1a3cc24752f6e8f351
-
SHA512
192e3ce197a090904d5e3838eb411e38097c20d5d7efbc6d055140fcc88e0a4cef78293e8c1c9c8abaeec55f075e17456e7607b7eaad1ed3b87866aa648d2a71
-
SSDEEP
3072:SNztnBlBp9ALvNKMKWqXs8NqU+xwDbUe2WpZJmXHB8zrYqHphTfBsbOEU0+rDGLh:SNJfRAzNK5W/1WRmR4r7JhuyE8wPQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ce6de8599b565fddf67ee026ee4bc285
Files
-
ce6de8599b565fddf67ee026ee4bc285.exe windows:4 windows x86 arch:x86
dd2e3254a193cf4be6d2ce044c38fcf5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetModuleHandleA
GetProcAddress
oleaut32
SysFreeString
advapi32
RegCloseKey
user32
CharNextA
gdi32
SaveDC
version
VerQueryValueA
wsock32
send
ole32
CoTaskMemFree
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
comctl32
ImageList_Add
wininet
FtpPutFileA
winmm
waveInOpen
netapi32
Netbios
gdiplus
GdipFree
msacm32
acmStreamSize
ntdll
NtQuerySystemInformation
NtUnmapViewOfSection
ws2_32
WSAIoctl
shfolder
SHGetFolderPathA
avicap32
capGetDriverDescriptionA
Sections
.MPRESS1 Size: 224KB - Virtual size: 700KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE