Static task
static1
Behavioral task
behavioral1
Sample
001649b1a654bee88a034ec4d7c06030N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
001649b1a654bee88a034ec4d7c06030N.exe
Resource
win10v2004-20240802-en
General
-
Target
001649b1a654bee88a034ec4d7c06030N.exe
-
Size
77KB
-
MD5
001649b1a654bee88a034ec4d7c06030
-
SHA1
08593ee3f9129aa6c65bf11491e48b237090c32d
-
SHA256
f5d28952432fbe662d04388ec552223a2c8ba005a0bc01913f3f571f8b3e2b64
-
SHA512
57018b7eedd1ff1f70c44be2e567f133a5e7daef62e645ff9d458b08a2f332c95aa2e0e4de24be801b089f1734c7aa2833ff2b9d56ac94532bce3570c59b0e0d
-
SSDEEP
1536:m9T7FDV4M50L5etbcXwML+ObS7eWtdf8Sghp3/9S/szXUI9qVmWtWFUCXj7AB/J:eT7teo0L0ewM66mhdcpvxXb9qcWtWZcX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 001649b1a654bee88a034ec4d7c06030N.exe
Files
-
001649b1a654bee88a034ec4d7c06030N.exe.exe windows:4 windows x86 arch:x86
b94e96e065569fbf5e540b1fed86a948
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
CreateDirectoryA
GetUserDefaultLangID
GetCurrentThread
SetStdHandle
GetCPInfo
SystemTimeToFileTime
RtlMoveMemory
GetProcAddress
VirtualProtect
UnhandledExceptionFilter
GetLocalTime
DeleteFileA
GetThreadLocale
SizeofResource
LCMapStringA
GetDiskFreeSpaceA
IsDBCSLeadByte
GetModuleHandleA
CompareFileTime
GetExitCodeProcess
GetEnvironmentStrings
GetFileType
VirtualQuery
GetModuleFileNameW
LoadResource
GetTempPathA
FileTimeToLocalFileTime
msvcrt
_exit
__set_app_type
_initterm
__p__fmode
_adjust_fdiv
_controlfp
__p___initenv
__getmainargs
_except_handler3
_XcptFilter
__p__commode
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ