Static task
static1
Behavioral task
behavioral1
Sample
fb5d277ed7939bfad1b7981df891552b268961a93baf0f3828bda151f5d1f9c9.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb5d277ed7939bfad1b7981df891552b268961a93baf0f3828bda151f5d1f9c9.exe
Resource
win10v2004-20240802-en
General
-
Target
fb5d277ed7939bfad1b7981df891552b268961a93baf0f3828bda151f5d1f9c9
-
Size
576KB
-
MD5
7cae0c89d0e4f3556249b40d1bdf0a9c
-
SHA1
7aa7c3d54994bb07c3de70fc19e0ea7a0f50f83f
-
SHA256
fb5d277ed7939bfad1b7981df891552b268961a93baf0f3828bda151f5d1f9c9
-
SHA512
52f71ea90a6c07b72b1e4d09e459143c245f0609d0a1bbfb322393bb65d7465767a80626282e5b3924f2de14eea4d63877e29d106a6121709ebc3db72d3068d9
-
SSDEEP
12288:32Xnzm4XiXU9w7tRWhm4d3VFSr3rov8zkNKkcdsH7SE0C:unzm4iU9w7tRWhm2VOro0zkNH7SvC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb5d277ed7939bfad1b7981df891552b268961a93baf0f3828bda151f5d1f9c9
Files
-
fb5d277ed7939bfad1b7981df891552b268961a93baf0f3828bda151f5d1f9c9.exe windows:5 windows x86 arch:x86
b36eb9a4c6fca2002f3fab21d6da4be8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
user32
EndPaint
advapi32
RegCloseKey
shell32
ShellExecuteA
iphlpapi
GetAdaptersInfo
ws2_32
htonl
wtsapi32
WTSRegisterSessionNotification
Sections
.MPRESS1 Size: 438KB - Virtual size: 828KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aLSzbD Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.HEkxdF Size: 3KB - Virtual size: 2KB
IMAGE_SCN_MEM_READ
.iycwskh Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ