Static task
static1
Behavioral task
behavioral1
Sample
e89588902c94e03f1d4ecf31227f8590N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e89588902c94e03f1d4ecf31227f8590N.exe
Resource
win10v2004-20240802-en
General
-
Target
e89588902c94e03f1d4ecf31227f8590N.exe
-
Size
32KB
-
MD5
e89588902c94e03f1d4ecf31227f8590
-
SHA1
b8e48b4add198eec5afe79e7968d7843ee1a84f1
-
SHA256
d09bd228dccd70f1cdcf643c7bccbe4099dd57ed609a36f47dd3e25f79222ea7
-
SHA512
4d8fa2051377b975ce7b08a963f1a006ac96938c3963222b81d9e227e55db160a39723a9914cc210c58e459fd83b95e4898e4d64f822247dffa5dc3167643f0b
-
SSDEEP
384:JMHuCj2V5Xy5i//6opQhX5Ao/qXeXy+vdtSK99kfxoLFNW+gLCSw0cAgpMc48t62:JGuCm5iKPul5nvyUddwfSzFrVFnj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e89588902c94e03f1d4ecf31227f8590N.exe
Files
-
e89588902c94e03f1d4ecf31227f8590N.exe.exe windows:4 windows x86 arch:x86
51584a2ae0d3529daf101310334e90bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetUnhandledExceptionFilter
ExitProcess
GetModuleHandleA
GetProcAddress
FreeConsole
AddAtomA
FindAtomA
GetAtomNameA
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
malloc
memcpy
signal
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 96B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE