Static task
static1
Behavioral task
behavioral1
Sample
e1a20365fb0c7dab5f3f1c0a00d6d443.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1a20365fb0c7dab5f3f1c0a00d6d443.exe
Resource
win10v2004-20240226-en
General
-
Target
e1a20365fb0c7dab5f3f1c0a00d6d443
-
Size
35KB
-
MD5
e1a20365fb0c7dab5f3f1c0a00d6d443
-
SHA1
ba62425e6f92327afce6555461a2af2528036155
-
SHA256
9680bd8569cf0a57175616b46cd3989a7b0df717b3df9d70a00fa4f867e292eb
-
SHA512
e72822c373050b785f7d3081d0b940341dc3a9f9c02160955f66b5b83406ace77b25fc291e8ee6c4e502be71926b11ae0a1d13dd16e0a410c80cbdd0e42f770d
-
SSDEEP
768:bUoauNuJYrj0yRSqTIffw3y41fnYJbv1ruGD1G+twJKX:br1H0iTIffwiskvgGD1jbX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1a20365fb0c7dab5f3f1c0a00d6d443
Files
-
e1a20365fb0c7dab5f3f1c0a00d6d443.exe windows:4 windows x86 arch:x86
fce7809a30096dee5d325be7178490ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
Sleep
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ