Static task
static1
Behavioral task
behavioral1
Sample
e1668df9b161f9226e51e9f5674916c537894abb0d9ce064adf9864aa92c46b2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e1668df9b161f9226e51e9f5674916c537894abb0d9ce064adf9864aa92c46b2.exe
Resource
win10v2004-20240508-en
General
-
Target
e1668df9b161f9226e51e9f5674916c537894abb0d9ce064adf9864aa92c46b2
-
Size
1.1MB
-
MD5
fc396132ac4cb93ca38ea01d91f7a7ad
-
SHA1
037a4bdac4877a8d13527d6ab069a5649b3aa848
-
SHA256
e1668df9b161f9226e51e9f5674916c537894abb0d9ce064adf9864aa92c46b2
-
SHA512
745a95fc0ca35b6f6318fc864fc85cf7ac71dbed617ac954198dd5dbec88fbdbed111b8ba7e010f84ebd9f0392d001f11bd9e70c4805560df56a1f22e81b2563
-
SSDEEP
24576:37/LT0zYgbKXqz8fuUYfYsR6QYinHSuhcXtw6Lc28kDX2zzYd6fm:37GW5YfNR6a/hcdwm9n6O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1668df9b161f9226e51e9f5674916c537894abb0d9ce064adf9864aa92c46b2
Files
-
e1668df9b161f9226e51e9f5674916c537894abb0d9ce064adf9864aa92c46b2.exe windows:4 windows x86 arch:x86
b3bfcb6becaf29dba67679770e613826
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4441
msvcrt
_adjust_fdiv
kernel32
InterlockedDecrement
user32
UpdateWindow
shell32
ShellExecuteA
ole32
CoCreateInstance
oleaut32
CreateErrorInfo
urlmon
URLDownloadToFileA
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
advapi32
RegDeleteKeyA
Sections
.text Size: 148KB - Virtual size: 568KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 976KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ