Static task
static1
Behavioral task
behavioral1
Sample
190240eb001e5dfe1ff6eb683367ae8748de8ee8cbd89d0a9fa94993f17393af.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
190240eb001e5dfe1ff6eb683367ae8748de8ee8cbd89d0a9fa94993f17393af.exe
Resource
win10v2004-20240709-en
General
-
Target
190240eb001e5dfe1ff6eb683367ae8748de8ee8cbd89d0a9fa94993f17393af
-
Size
42KB
-
MD5
80d15dccb10b5665eb13c42386eb463a
-
SHA1
eda68241af77fbcca0e578e6aeb715ad553209fb
-
SHA256
190240eb001e5dfe1ff6eb683367ae8748de8ee8cbd89d0a9fa94993f17393af
-
SHA512
d414a98947f3d3955f5d36e0432ad6dd6ee0272099e3c5f3f4a9543ce017d6c7ad922cec202ac43adfd2fac29c634b3a43c0aa13e699a042202df795b2d9e0dd
-
SSDEEP
768:dYGtdtFR6M13vfdHldhwyEr+OGa0aEYS1y9YaPQR:GIUM13vfdHldhwt+OGa01oiaPQR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 190240eb001e5dfe1ff6eb683367ae8748de8ee8cbd89d0a9fa94993f17393af
Files
-
190240eb001e5dfe1ff6eb683367ae8748de8ee8cbd89d0a9fa94993f17393af.exe windows:4 windows x86 arch:x86
651c3f15c13ce5e90a7fca6b951f3dd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SizeofResource
VerLanguageNameW
LoadResource
VirtualAlloc
VirtualFree
lstrlenW
GetModuleHandleA
GetCommandLineA
FindResourceA
VerifyVersionInfoA
ExitProcess
user32
EndPaint
GetMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
LoadMenuA
PostQuitMessage
SetMenu
ShowWindow
TranslateMessage
UpdateWindow
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
DispatchMessageA
gdi32
CreateCompatibleDC
DeleteDC
SelectObject
BitBlt
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ