Static task
static1
Behavioral task
behavioral1
Sample
9e36777ea0a57e1ce19fdd608de55e60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9e36777ea0a57e1ce19fdd608de55e60N.exe
Resource
win10v2004-20240709-en
General
-
Target
9e36777ea0a57e1ce19fdd608de55e60N.exe
-
Size
112KB
-
MD5
9e36777ea0a57e1ce19fdd608de55e60
-
SHA1
0d2c9af7edde75341666bfbc38dbca4abd1d776a
-
SHA256
8f0b7a610ceacce22582f66ef12af74924e2d37266bcd1236ac31729cb668b66
-
SHA512
3ab980129a395448360c0b42784dd06f41160e9295109651b0e6bf68ac3bf59c77f935a2339fe3057f9fc7a83972a77091828cdcf4402b12e59fb9891df1e51a
-
SSDEEP
1536:0FxX6+nDeodkr7hKevoPExBWedqytDPvz8QrYC/09fDHMfmj/Dh:mqVodObBtjvzXEK09fA+rh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9e36777ea0a57e1ce19fdd608de55e60N.exe
Files
-
9e36777ea0a57e1ce19fdd608de55e60N.exe.exe windows:4 windows x86 arch:x86
299364bce4834828b11f58ce30d8e5f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
GetVersionExA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetModuleHandleA
WriteFile
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
GetLastError
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
CloseHandle
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE