Static task
static1
Behavioral task
behavioral1
Sample
da4ab299d9221af6b7bd7b6aa66dab61212c676f839d591d459a2280c77030ef.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
da4ab299d9221af6b7bd7b6aa66dab61212c676f839d591d459a2280c77030ef.exe
Resource
win10v2004-20240226-en
General
-
Target
da4ab299d9221af6b7bd7b6aa66dab61212c676f839d591d459a2280c77030ef
-
Size
37KB
-
MD5
0131cd016dd2cfa5087b875339d27b27
-
SHA1
e24d5757ad5a05c840d838c0048d151f359dd8f0
-
SHA256
da4ab299d9221af6b7bd7b6aa66dab61212c676f839d591d459a2280c77030ef
-
SHA512
700b7ff48a24fe9ddd2c4f72413a7f38cb39c86cd4e4577f0cb60c5cbd1754dc27c5329edb44417706850fe4742948153e41c30bf7eca2c8bc4cd4a8ebb3b22e
-
SSDEEP
768:cy5dA+DX/8KH13vfdHldhwyEgnpLC17xbnyjm:bdA+oi13vfdHldhwu27tR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da4ab299d9221af6b7bd7b6aa66dab61212c676f839d591d459a2280c77030ef
Files
-
da4ab299d9221af6b7bd7b6aa66dab61212c676f839d591d459a2280c77030ef.exe windows:4 windows x86 arch:x86
5bafb291df732bd8895bcff11e861198
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
VirtualAlloc
SizeofResource
lstrlenW
LockResource
LoadResource
GetModuleHandleA
GetCommandLineA
FindResourceA
VirtualFree
ExitProcess
user32
GetMessageA
GetSystemMetrics
LoadCursorA
PostQuitMessage
ReleaseDC
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
GetDC
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
BitBlt
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ