Static task
static1
Behavioral task
behavioral1
Sample
90b75a7a7c678fbe65a0fcd70a477760N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
90b75a7a7c678fbe65a0fcd70a477760N.exe
Resource
win10v2004-20240802-en
General
-
Target
90b75a7a7c678fbe65a0fcd70a477760N.exe
-
Size
6KB
-
MD5
90b75a7a7c678fbe65a0fcd70a477760
-
SHA1
bad439bdb49a93cdffd3c452cf2b3573e39a2f92
-
SHA256
8b329e8510db8ee5dc5a78e455855f24774777cb399c105b7fa6a891e0cf59f9
-
SHA512
a79b65a58c1346d7ebee5c9e6f35501287b4308505b49ff434aa3333fdc27f5dd8aa6ecccc6db798a1dcb4be9a9048865422a929142d5dde1334f8ed8d8f753b
-
SSDEEP
48:ShPwQ2WNmuCFDaC+P7srHEMUTlGACt8i0yXoMULzuPo32P55WlGA8nH5o86YbPt4:oPhw5BaBPwHEMU7ji7ufsuqH7ptj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90b75a7a7c678fbe65a0fcd70a477760N.exe
Files
-
90b75a7a7c678fbe65a0fcd70a477760N.exe.exe windows:6 windows x64 arch:x64
0825d3fe19f3400a1eb2cb23b2a4a81a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetStdHandle
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
CreateThread
WriteConsoleA
user32
wsprintfA
ntdll
NtWaitForSingleObject
NtProtectVirtualMemory
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ