Static task
static1
Behavioral task
behavioral1
Sample
a4cbcdfc59a1fdaf0ffedd17a205d7533a51f0ed0d35a4343bdfdceb34b5b7da.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4cbcdfc59a1fdaf0ffedd17a205d7533a51f0ed0d35a4343bdfdceb34b5b7da.exe
Resource
win10v2004-20240412-en
General
-
Target
a4cbcdfc59a1fdaf0ffedd17a205d7533a51f0ed0d35a4343bdfdceb34b5b7da
-
Size
36KB
-
MD5
9907a7a3a063ddb2cf0a81fa3ae7a930
-
SHA1
93a03959b90b8eb229187ffc4b2e6bc43dde5113
-
SHA256
a4cbcdfc59a1fdaf0ffedd17a205d7533a51f0ed0d35a4343bdfdceb34b5b7da
-
SHA512
09b1321117e3925a5378e86881bb44d239b86b614d88bf9d60d4be3ad672f6ada079a3b9852cd0e0869fe3f1a776d95088457dd8134d79d1a202cb200cd2875e
-
SSDEEP
768:mKUGBAgVr38qxRb9ZVggyVAwN+N0stg5LWIpnxfld9mgQ:mKUE9J3v94N+9K5LxlX1Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4cbcdfc59a1fdaf0ffedd17a205d7533a51f0ed0d35a4343bdfdceb34b5b7da
Files
-
a4cbcdfc59a1fdaf0ffedd17a205d7533a51f0ed0d35a4343bdfdceb34b5b7da.exe windows:5 windows x86 arch:x86
4c1e123b6751132819fc05618ebd08a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
exit
_exit
kernel32
GetStartupInfoA
GetModuleHandleA
GetSystemInfo
ExitProcess
user32
DefWindowProcW
DispatchMessageW
DrawTextW
EndPaint
GetClientRect
GetMessageW
GetWindowRect
PostQuitMessage
RegisterClassExW
TranslateMessage
GetSystemMetrics
CharLowerW
BeginPaint
CreateWindowExW
gdi32
TextOutW
Rectangle
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ