Static task
static1
Behavioral task
behavioral1
Sample
83bd4c82f7196a7face917002254a380N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
83bd4c82f7196a7face917002254a380N.exe
Resource
win10v2004-20240709-en
General
-
Target
83bd4c82f7196a7face917002254a380N.exe
-
Size
464KB
-
MD5
83bd4c82f7196a7face917002254a380
-
SHA1
f209e7c66df4d5d633ea9680747f8e9633760ac4
-
SHA256
f1711fbc603919114f65736e3579f9a05ee0c1edede8e92cdac3fa5bb82d379a
-
SHA512
437eaf5c9568cec9cf5c868b7b8ff145684d654a1f1ca4f8da4956a3125cc4370c78b757f098ac29c15f0e99862bfa00e1b406eba8afaaf1dcc16a63460d790b
-
SSDEEP
6144:CHkWcDpi78KSrafqV5areuyFwBqgmGNGXN/O8OCLV0wbmztvchDVmKQQWLpYzLtF:CHlc87eqqV5e+wBV6O+tYtEVmKnWNY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83bd4c82f7196a7face917002254a380N.exe
Files
-
83bd4c82f7196a7face917002254a380N.exe.exe windows:5 windows x86 arch:x86
efca855c5fac5cb74b1010e36b345f46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
oleaut32
VarBstrFromI1
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l2 Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE