Static task
static1
Behavioral task
behavioral1
Sample
b5a0db39aba7c563ef75868aa847a6ff4950e9affd12c90664d119f96820e6de.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5a0db39aba7c563ef75868aa847a6ff4950e9affd12c90664d119f96820e6de.exe
Resource
win10v2004-20240412-en
General
-
Target
b5a0db39aba7c563ef75868aa847a6ff4950e9affd12c90664d119f96820e6de
-
Size
38KB
-
MD5
7a848b889e028cda0130c033f649679d
-
SHA1
0c8b5f32723db0e43bc586852aac0777d2be84cb
-
SHA256
b5a0db39aba7c563ef75868aa847a6ff4950e9affd12c90664d119f96820e6de
-
SHA512
29bb3f8fa5ed9a57b7227d657255e86bc5c8688047ecbe331d5a7043c376c219b45b202b6abaf9bfca8161705f44ec498b3d980b7b3fdbd95d53eb9d626fe125
-
SSDEEP
768:PT2t0cp04cpAwKz8jp35fCzCMMpxLe5csNzx5au9FPT:PTYtp04xcppTzijx5aqh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5a0db39aba7c563ef75868aa847a6ff4950e9affd12c90664d119f96820e6de
Files
-
b5a0db39aba7c563ef75868aa847a6ff4950e9affd12c90664d119f96820e6de.exe windows:4 windows x86 arch:x86
ebb5fea1a6448dbfbb1b73c1dd99b3d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendMessageA
DialogBoxParamA
DestroyWindow
DefWindowProcA
EndDialog
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
PostQuitMessage
RegisterClassExA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
kernel32
GetLogicalDriveStringsA
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
CreateFileA
GetModuleHandleA
FindFirstFileA
FindClose
GetFileSize
FindNextFileA
CloseHandle
GetFileType
GetModuleFileNameA
GetProcessHeap
DeleteFileA
GetEnvironmentStringsA
shfolder
SHGetFolderPathA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ