Static task
static1
Behavioral task
behavioral1
Sample
4a1fac3fa8a7d21dcd71be871bb3b2e0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a1fac3fa8a7d21dcd71be871bb3b2e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
4a1fac3fa8a7d21dcd71be871bb3b2e0N.exe
-
Size
464KB
-
MD5
4a1fac3fa8a7d21dcd71be871bb3b2e0
-
SHA1
e1e7f052ac2215b9245d52d8451cff8141b630ce
-
SHA256
188265d1b05379298718b17126ed0d80a1fbecc7316ce7ea34549a63e292679c
-
SHA512
70c02889c4aa9e00b0a755f7ab839249dc1ea996f2a2c4a64ace39e9034cb88ec2a20f36c373d612d19200325613cdb5bf7e39bd9ac0c50e9bb032d6dd712ec9
-
SSDEEP
12288:1Nlc87eqqV5e+wBV6O+EcldTBOP7B4+BV3D:1NSqqHeVBx/crBx+BlD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a1fac3fa8a7d21dcd71be871bb3b2e0N.exe
Files
-
4a1fac3fa8a7d21dcd71be871bb3b2e0N.exe.exe windows:5 windows x86 arch:x86
efca855c5fac5cb74b1010e36b345f46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
oleaut32
VarBstrFromI1
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l2 Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE