Static task
static1
Behavioral task
behavioral1
Sample
d9d538a19866ffe7aad2eca359cf7f0f8cc1c47af7990a82c7332e2f0f6228cd.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d9d538a19866ffe7aad2eca359cf7f0f8cc1c47af7990a82c7332e2f0f6228cd.exe
Resource
win10v2004-20240508-en
General
-
Target
d9d538a19866ffe7aad2eca359cf7f0f8cc1c47af7990a82c7332e2f0f6228cd
-
Size
51KB
-
MD5
0f239bbd47d1fcb93e6880834b06bc71
-
SHA1
771e47d0421017ca17fcfb4d5f1d0d2d40e981c9
-
SHA256
d9d538a19866ffe7aad2eca359cf7f0f8cc1c47af7990a82c7332e2f0f6228cd
-
SHA512
10a7265d6351d69173d083cd54eadabed4c59dc1edb3a0363a921bfbbf70802049a0e25632d7a6c6fa49277a78ad0184d86e959cac4ea6e372ff9e3dfdaf42a1
-
SSDEEP
768:zOb7KtFXbKiciqI8LzwzGdgpH8tyfiQeOPRz2LWUMZX/8DBSCgrh5ZoA4FaXup:CHKvXlLd8tuXeOZaLZgEDJc/Z3W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d9d538a19866ffe7aad2eca359cf7f0f8cc1c47af7990a82c7332e2f0f6228cd
Files
-
d9d538a19866ffe7aad2eca359cf7f0f8cc1c47af7990a82c7332e2f0f6228cd.exe windows:4 windows x86 arch:x86
3ba6010fa2b7d58dc680694f419d288d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
VerLanguageNameA
LoadResource
VirtualFree
lstrlenA
GetModuleHandleA
GetCommandLineA
FindResourceA
VirtualAlloc
ExitProcess
user32
DispatchMessageA
GetMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
LoadMenuA
PostQuitMessage
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
EndPaint
gdi32
CreateCompatibleDC
DeleteDC
SelectObject
BitBlt
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ