Static task
static1
Behavioral task
behavioral1
Sample
4814642635473042ca8ca1f42ca22f80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4814642635473042ca8ca1f42ca22f80N.exe
Resource
win10v2004-20240709-en
General
-
Target
4814642635473042ca8ca1f42ca22f80N.exe
-
Size
7KB
-
MD5
4814642635473042ca8ca1f42ca22f80
-
SHA1
622991dccc7f8a7f06ff61a1d45f1930335b4a8a
-
SHA256
34a66511c6df5988c96ea13814d51aaab5263fad7f87f8586da78ffa4cc6616b
-
SHA512
3aa6678ab9768f480bef334412f7d8b2096cf6fa3b068f30e76e6b3286594228f1563691175e8556272ae694ae608bd9e8c1a4ce42b0c31a32a44ec98d74e323
-
SSDEEP
96:QKYtevLGat6qYKB6YLzLwAnQWRRUF2CqDpNbYciqnqOiqMAYKKC:NYte6qnjBQWRRszoqOZMFKKC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4814642635473042ca8ca1f42ca22f80N.exe
Files
-
4814642635473042ca8ca1f42ca22f80N.exe.exe windows:5 windows x86 arch:x86
b1decad0f067131fff2e76ab43787f60
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpOpenRequestW
InternetConnectW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
InternetOpenW
kernel32
ReadFile
SleepEx
GetCurrentDirectoryW
HeapFree
FreeLibrary
GetProcAddress
GetModuleHandleW
HeapCreate
HeapAlloc
GetModuleFileNameW
GetTempPathW
CreateFileW
GetFileSize
lstrlenW
ExitProcess
DeleteFileW
lstrcmpW
WriteFile
CloseHandle
LoadLibraryW
user32
wsprintfW
shell32
ShellExecuteW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ