Static task
static1
Behavioral task
behavioral1
Sample
822a8860e89e38ece744e6f152cc51d693417c80f82d38a63255ab5135fc2ef2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
822a8860e89e38ece744e6f152cc51d693417c80f82d38a63255ab5135fc2ef2.exe
Resource
win10v2004-20240412-en
General
-
Target
822a8860e89e38ece744e6f152cc51d693417c80f82d38a63255ab5135fc2ef2
-
Size
41KB
-
MD5
1a48c8e4c9b68dbcfc818841001968f3
-
SHA1
e55346280fba8cb0946efa92d7a912312e115b72
-
SHA256
822a8860e89e38ece744e6f152cc51d693417c80f82d38a63255ab5135fc2ef2
-
SHA512
617ef86a83b61776a540c78064352194052f6db54b1d7767c254fa2f4cba7425280a6869b55c78da6ec7218ec7c3539aa48475ced79fd5b39125c7f0e828cc15
-
SSDEEP
768:dYGtdtFR6M13vfdHldhwyEr+OGa0aEYS1y9YaPQo:GIUM13vfdHldhwt+OGa01oiaPQo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 822a8860e89e38ece744e6f152cc51d693417c80f82d38a63255ab5135fc2ef2
Files
-
822a8860e89e38ece744e6f152cc51d693417c80f82d38a63255ab5135fc2ef2.exe windows:4 windows x86 arch:x86
651c3f15c13ce5e90a7fca6b951f3dd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
VerLanguageNameW
LoadResource
VirtualAlloc
VirtualFree
lstrlenW
GetModuleHandleA
GetCommandLineA
FindResourceA
VerifyVersionInfoA
ExitProcess
user32
EndPaint
GetMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
LoadMenuA
PostQuitMessage
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
DispatchMessageA
gdi32
CreateCompatibleDC
DeleteDC
SelectObject
BitBlt
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ