Static task
static1
Behavioral task
behavioral1
Sample
0822637e3ea25d618a355089e8f9552b47195ee0db2876b5572ff915d9329696.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0822637e3ea25d618a355089e8f9552b47195ee0db2876b5572ff915d9329696.exe
Resource
win10v2004-20240412-en
General
-
Target
0822637e3ea25d618a355089e8f9552b47195ee0db2876b5572ff915d9329696
-
Size
44KB
-
MD5
d6000ed335f9984d77a73dd16df6b620
-
SHA1
d426c93cd4bb84c1ebfb71350a49ffa30a049922
-
SHA256
0822637e3ea25d618a355089e8f9552b47195ee0db2876b5572ff915d9329696
-
SHA512
4a53fe7324a597cbb98c2d7939e6a84a277789dd2a8440e389e9dcc30f1d0dd0e0a63f6fe0ec4367ce5e0ac26f8c30e5f167e4ff9f4b30eab48b89723332f4c8
-
SSDEEP
768:dYGtdtFR6M13vfdHldhwyEr+OGa0aEYS19meELpvnS:GIUM13vfdHldhwt+OGa01HmeGnS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0822637e3ea25d618a355089e8f9552b47195ee0db2876b5572ff915d9329696
Files
-
0822637e3ea25d618a355089e8f9552b47195ee0db2876b5572ff915d9329696.exe windows:4 windows x86 arch:x86
651c3f15c13ce5e90a7fca6b951f3dd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
VerLanguageNameW
LoadResource
VirtualAlloc
VirtualFree
lstrlenW
GetModuleHandleA
GetCommandLineA
FindResourceA
VerifyVersionInfoA
ExitProcess
user32
EndPaint
GetMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
LoadMenuA
PostQuitMessage
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
DispatchMessageA
gdi32
CreateCompatibleDC
DeleteDC
SelectObject
BitBlt
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ