Static task
static1
Behavioral task
behavioral1
Sample
df5dbdf69adf2ada5d103b9998aa6819.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df5dbdf69adf2ada5d103b9998aa6819.exe
Resource
win10v2004-20240226-en
General
-
Target
df5dbdf69adf2ada5d103b9998aa6819
-
Size
244KB
-
MD5
df5dbdf69adf2ada5d103b9998aa6819
-
SHA1
cda780044cc5bb9234ccf37fdae1309e7229202e
-
SHA256
cefa9b2c8ec1f7bec7d201b6078727a0bf39e86f5c3e43903d7811c77d62169b
-
SHA512
eec036ca22a3b5aa5e2f7b17a94dc7ec1504808f021dfecec397cf02d77e998fe9288fa9c217e4f2d4591dafe575b5be677d80434be362b6ef7bb54ea3fd8fbf
-
SSDEEP
6144:5uu6/LvhmIAZhuQVZogdkXAKZFiaeF8wJ8hbF:5uRQF7VZogDKvSFj8F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df5dbdf69adf2ada5d103b9998aa6819
Files
-
df5dbdf69adf2ada5d103b9998aa6819.exe windows:4 windows x86 arch:x86
ad90a669486f7037009a01360a533303
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
SetEvent
WriteProfileSectionA
GlobalMemoryStatusEx
SuspendThread
VerifyVersionInfoA
EndUpdateResourceW
GetCurrentProcessId
PeekNamedPipe
lstrcpynA
WriteTapemark
LocalSize
user32
GetClassWord
DdeCmpStringHandles
DestroyCursor
IsIconic
DlgDirSelectComboBoxExA
CreateMDIWindowA
GetKBCodePage
DeleteMenu
gdi32
GetClipBox
SetTextJustification
SetDIBitsToDevice
SelectObject
CheckColorsInGamut
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 798B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE