Static task
static1
Behavioral task
behavioral1
Sample
e45bcebe62a19e8ea027873605c200865a3dd1876a9e44cd3b353087e7a7a094.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
e45bcebe62a19e8ea027873605c200865a3dd1876a9e44cd3b353087e7a7a094.exe
Resource
win10v2004-20240426-en
General
-
Target
e45bcebe62a19e8ea027873605c200865a3dd1876a9e44cd3b353087e7a7a094
-
Size
1.6MB
-
MD5
bc5617a084adcd6541aab700baeeafc5
-
SHA1
254047070b0d77ea99a44f4914e23b275c56a755
-
SHA256
e45bcebe62a19e8ea027873605c200865a3dd1876a9e44cd3b353087e7a7a094
-
SHA512
4c75694bbb1a15b14abfe2e8ac9b2fe01f5cef8110ae210ae76d7c09c093e82aad0eed49265539115bae2fba53cff4ecb772701bbac32823c324e91555ed3543
-
SSDEEP
49152://z4BOeD854Bx6iOPkopXQGPR2FpA9ONuNudlHb+cGPswzgX:3oOeD854pOPJA29MndlacIzgX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e45bcebe62a19e8ea027873605c200865a3dd1876a9e44cd3b353087e7a7a094
Files
-
e45bcebe62a19e8ea027873605c200865a3dd1876a9e44cd3b353087e7a7a094.exe windows:4 windows x86 arch:x86
107ff63f658d6feb25c073be45ea521d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
user32
LoadIconA
gdi32
GetTextMetricsA
winmm
waveOutUnprepareHeader
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
shell32
ShellExecuteA
ole32
CLSIDFromString
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
ws2_32
inet_ntoa
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 628KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 980KB - Virtual size: 980KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ