Static task
static1
Behavioral task
behavioral1
Sample
a4d84b1c6dc404eabab2c01bc442598a61b9f26e44ce917785621305e3487346.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4d84b1c6dc404eabab2c01bc442598a61b9f26e44ce917785621305e3487346.exe
Resource
win10v2004-20240226-en
General
-
Target
a4d84b1c6dc404eabab2c01bc442598a61b9f26e44ce917785621305e3487346
-
Size
37KB
-
MD5
149c9c4ae308de22306e1630ce981a71
-
SHA1
4f4d787799087b651b95745b110bfc977d73bbbf
-
SHA256
a4d84b1c6dc404eabab2c01bc442598a61b9f26e44ce917785621305e3487346
-
SHA512
ce75985ff5010d320765a7a7e62a4b9b77f8b9b9d8306f747a24881cc3e1e55ba70f269b280b282f040d4a594d06e8cee2e5e69c62e5a29290d6048a92fc6ba9
-
SSDEEP
768:cy5dA+DX/8KH13vfdHldhwyEgnpLC17xbny6y:bdA+oi13vfdHldhwu27tY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4d84b1c6dc404eabab2c01bc442598a61b9f26e44ce917785621305e3487346
Files
-
a4d84b1c6dc404eabab2c01bc442598a61b9f26e44ce917785621305e3487346.exe windows:4 windows x86 arch:x86
5bafb291df732bd8895bcff11e861198
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
VirtualAlloc
SizeofResource
lstrlenW
LockResource
LoadResource
GetModuleHandleA
GetCommandLineA
FindResourceA
VirtualFree
ExitProcess
user32
GetMessageA
GetSystemMetrics
LoadCursorA
PostQuitMessage
ReleaseDC
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
GetDC
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
BitBlt
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ