Static task
static1
Behavioral task
behavioral1
Sample
e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe
Resource
win7-20240221-en
General
-
Target
e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d
-
Size
2.3MB
-
MD5
5bd70186899c032e2f05fe9894c02698
-
SHA1
5a3a792a406f7a75c58e1b72fe24acffb8b088bd
-
SHA256
e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d
-
SHA512
1049c54a7c2ccd36bef6cee5853da8e931889fbe045b0a189e6d13090df8b443ed228f3abe9ba4dc8338eee3a97fd6b6e2a5267e35f9a90a8b35cf109c0ea790
-
SSDEEP
49152:x1vKR2L2PzCOXeiBFuKqFt9yW3Dv5lju+AVJ366N5zr9pgNrZgX8IwQk0:v8TeEFuKqFtcWTRljuZj9pigX8If
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d
Files
-
e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe windows:4 windows x86 arch:x86
2b6dab813f0c322f9aab13212e8c175d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
user32
OpenClipboard
gdi32
SelectClipRgn
winmm
midiStreamRestart
winspool.drv
ClosePrinter
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
OleInitialize
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
ws2_32
recvfrom
comdlg32
GetSaveFileNameA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 1.3MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 952KB - Virtual size: 952KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ