Static task
static1
Behavioral task
behavioral1
Sample
a489aca83e8d963b5a23ba7324898aabeea0c4128f4f41cb10756655434b3283.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a489aca83e8d963b5a23ba7324898aabeea0c4128f4f41cb10756655434b3283.exe
Resource
win10v2004-20240426-en
General
-
Target
a489aca83e8d963b5a23ba7324898aabeea0c4128f4f41cb10756655434b3283
-
Size
41KB
-
MD5
75e92cbfa3ff3ad5acc6eebb59dda457
-
SHA1
42881fad13af4715bd8c32ba7843886953655312
-
SHA256
a489aca83e8d963b5a23ba7324898aabeea0c4128f4f41cb10756655434b3283
-
SHA512
70487793559aad7aa0048a31bab3955837029fff0900b1aab69d51d309e14a6154b7ac6f4392c970be98f8be1af5b71242ccc5e1fe9758bb5c5d0729e4c881be
-
SSDEEP
768:dYGtdtFR6M13vfdHldhwyEr+OGa0aEYS1y9YaPQa:GIUM13vfdHldhwt+OGa01oiaPQa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a489aca83e8d963b5a23ba7324898aabeea0c4128f4f41cb10756655434b3283
Files
-
a489aca83e8d963b5a23ba7324898aabeea0c4128f4f41cb10756655434b3283.exe windows:4 windows x86 arch:x86
651c3f15c13ce5e90a7fca6b951f3dd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
VerLanguageNameW
LoadResource
VirtualAlloc
VirtualFree
lstrlenW
GetModuleHandleA
GetCommandLineA
FindResourceA
VerifyVersionInfoA
ExitProcess
user32
EndPaint
GetMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
LoadMenuA
PostQuitMessage
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
DispatchMessageA
gdi32
CreateCompatibleDC
DeleteDC
SelectObject
BitBlt
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ