Static task
static1
Behavioral task
behavioral1
Sample
1eada084675243704ca7e6e715972e70.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1eada084675243704ca7e6e715972e70.exe
Resource
win10v2004-20240704-en
General
-
Target
1eada084675243704ca7e6e715972e70.exe
-
Size
463KB
-
MD5
1eada084675243704ca7e6e715972e70
-
SHA1
fb83b3d2bb5dabb04171f2ef89668e9e54fd4a4b
-
SHA256
de7ffd7434ce20723572c87f46cce746cfd0747a4239deb0deca1bd772d5d5dd
-
SHA512
37819ce4bd6e7c6ca4f5499bcb3081dbe698bdc961ae86bac7167a161dce441a7735178b92243d3163980c42e8ab44232381208dde3bcad62f4271ea21db1387
-
SSDEEP
12288:EWlc87eqqV5e+wBV6O+C2ZM+5WHmQ4pNk:EWSqqHeVBxamVG1I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1eada084675243704ca7e6e715972e70.exe
Files
-
1eada084675243704ca7e6e715972e70.exe.exe windows:5 windows x86 arch:x86
3c6e5793e514214727b5614fbe758755
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l2 Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ