Static task
static1
Behavioral task
behavioral1
Sample
958836339a95c2635e3ca5e25cbf76ed271b3f94240aada402c7250f904f197b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
958836339a95c2635e3ca5e25cbf76ed271b3f94240aada402c7250f904f197b.exe
Resource
win10v2004-20240508-en
General
-
Target
958836339a95c2635e3ca5e25cbf76ed271b3f94240aada402c7250f904f197b
-
Size
57KB
-
MD5
1e508480608d5a985ef9396570449d54
-
SHA1
7ee9592c8dc73a5d61982ed490a471df62782b49
-
SHA256
958836339a95c2635e3ca5e25cbf76ed271b3f94240aada402c7250f904f197b
-
SHA512
91b43d1827f139321ad683c08999592ab47720fa7b4e94da097035b85a54b044ca45500a8e20e0382fbe4f0f44639bd215c5e7ad2cac336bb4c0bfedacfe6910
-
SSDEEP
768:vDqYnMTOV5ZXO9o56McUyc8fHAl4MbPA9ScVOuuGMp0scvQCs:AOjXO2MMcUyc2XM89JuGrvQCs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 958836339a95c2635e3ca5e25cbf76ed271b3f94240aada402c7250f904f197b
Files
-
958836339a95c2635e3ca5e25cbf76ed271b3f94240aada402c7250f904f197b.exe windows:5 windows x86 arch:x86
5038cc1d7d4ba6ce1ebcfec67b707138
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualFree
IsBadReadPtr
LoadLibraryA
SetLastError
ExitProcess
FreeLibrary
GetModuleHandleA
user32
MessageBoxIndirectA
SendMessageA
DialogBoxParamA
GetDlgItem
EndDialog
LoadIconA
comctl32
InitCommonControlsEx
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 510B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ