dym.2 a_4n
Static task
static1
Behavioral task
behavioral1
Sample
280a96e552498805f0a89a6b73c68680N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
280a96e552498805f0a89a6b73c68680N.exe
Resource
win10v2004-20240709-en
General
-
Target
280a96e552498805f0a89a6b73c68680N.exe
-
Size
349KB
-
MD5
280a96e552498805f0a89a6b73c68680
-
SHA1
c926a32474961c976122b2ff7456214c1974d2e3
-
SHA256
2cf663cabec42019784dab6d085432d51bca9477f030d0776d607e45819de08b
-
SHA512
7880f6869965734b5a1aca11535ddd58cf40858921d5ec75b09ff8952af9f635016ed0f2fe1bf5d3e8c8918f411a4cc0c9aa9f247e63b622e68951f01b2048ab
-
SSDEEP
6144:lL7rWfYTYIXbX7gjFnuMHQhmoCwD02Hy6T604:FfYIXvg9QfCQSC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 280a96e552498805f0a89a6b73c68680N.exe
Files
-
280a96e552498805f0a89a6b73c68680N.exe.exe windows:5 windows x86 arch:x86
7418ee48f19bc1772965ad8c308dd2cc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
sprintf
memcpy
kernel32
GetVersionExA
ExitProcess
CreateDirectoryW
QueryDosDeviceA
ConvertFiberToThread
GetCommandLineA
GetModuleHandleA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 293KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE