Static task
static1
Behavioral task
behavioral1
Sample
718536110673a2a793bdf3ff1222c77e424c7cc1c470d0f806773c6a4fb00ee0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
718536110673a2a793bdf3ff1222c77e424c7cc1c470d0f806773c6a4fb00ee0.exe
Resource
win10v2004-20240412-en
General
-
Target
718536110673a2a793bdf3ff1222c77e424c7cc1c470d0f806773c6a4fb00ee0
-
Size
29KB
-
MD5
8844f62cd084f5779b206630062b3d7d
-
SHA1
90fe13b56708536df4e5e565c1bc70b9bf9c6435
-
SHA256
718536110673a2a793bdf3ff1222c77e424c7cc1c470d0f806773c6a4fb00ee0
-
SHA512
3e5069a8026b0c35967fc19df4fe697bcd465b2f81e876971237104e29e1c8bab97dd922fda7b13f6f5e15a384c53adc54f853e88a487e3b8222ef28a1f9ae91
-
SSDEEP
768:ay5dA+D+Q7ZEE8K413vfdHldhwyEGVeTmNx:VdA+S/lJ13vfdHldhwAeox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 718536110673a2a793bdf3ff1222c77e424c7cc1c470d0f806773c6a4fb00ee0
Files
-
718536110673a2a793bdf3ff1222c77e424c7cc1c470d0f806773c6a4fb00ee0.exe windows:4 windows x86 arch:x86
5bafb291df732bd8895bcff11e861198
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
VirtualAlloc
SizeofResource
lstrlenW
LockResource
LoadResource
GetModuleHandleA
GetCommandLineA
FindResourceA
VirtualFree
ExitProcess
user32
GetMessageA
GetSystemMetrics
LoadCursorA
PostQuitMessage
ReleaseDC
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
GetDC
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
BitBlt
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ