Static task
static1
Behavioral task
behavioral1
Sample
3752c5bd13ba0b2315755e17d4e93490N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3752c5bd13ba0b2315755e17d4e93490N.exe
Resource
win10v2004-20240709-en
General
-
Target
3752c5bd13ba0b2315755e17d4e93490N.exe
-
Size
72KB
-
MD5
3752c5bd13ba0b2315755e17d4e93490
-
SHA1
05f5f1dd5aedefb2bb841687957db39354473d47
-
SHA256
ea8bb58f520a0838050b5d4342a3418fc043c215bbee7f56aa2bb634281488d5
-
SHA512
a464b821e5567d30a6d1ec4c46d12516c7a740177381a227c4ee492a73bf3c88f9fbf721bdf54a44922d75fabdd0887f61e8f463e3754ffd04c37e96b7d6993d
-
SSDEEP
1536:1PME0nJHEleopj5g2X+UuxCQT+fByvWmRjNvNHK7:xeKn95d+RCQmByH9NS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3752c5bd13ba0b2315755e17d4e93490N.exe
Files
-
3752c5bd13ba0b2315755e17d4e93490N.exe.exe windows:4 windows x86 arch:x86
e95e3c19c1b1846eddfe9b97188d572c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
CreateProcessW
DeleteFileA
ExitProcess
GetCommandLineW
GetModuleFileNameA
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
HeapAlloc
ReadFile
SetFileAttributesA
SetFilePointer
WriteFile
ntdll
NtFlushInstructionCache
NtOpenKey
NtProtectVirtualMemory
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE