Static task
static1
Behavioral task
behavioral1
Sample
769eca06b56a8baa1001d0b0ddb94960N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
769eca06b56a8baa1001d0b0ddb94960N.exe
Resource
win10v2004-20240802-en
General
-
Target
769eca06b56a8baa1001d0b0ddb94960N.exe
-
Size
5KB
-
MD5
769eca06b56a8baa1001d0b0ddb94960
-
SHA1
1be403883fe09b5fd28780658de7b0a8341305be
-
SHA256
76cbb3c0fad1978477872d6ffd61b9234fcb4f3296814497ec5962c0ec4c32cf
-
SHA512
406741507b33415946704dfec031b79a0c1d883c1d25580db8fa6e1c838826ce192b0cb6b7f5e6482c5bee4e856b19178e24f868c0812d6dd56fe1798a2299e4
-
SSDEEP
48:SclXWFPpT+dXVfzZh4yMGcKzMEkTaak4PAZivO2pB42pBdvMZL2R7tnRuqSxp:FWLkFfNnOKYloIQ2pm2pbYSFxE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 769eca06b56a8baa1001d0b0ddb94960N.exe
Files
-
769eca06b56a8baa1001d0b0ddb94960N.exe.exe windows:5 windows x86 arch:x86
7c5f9b19847a4e36080308f0e2c5add5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CloseHandle
VirtualFree
GetProcessHeap
CreateFileMappingW
MapViewOfFile
OpenProcess
UnmapViewOfFile
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 538B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 174B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ