Static task
static1
Behavioral task
behavioral1
Sample
44a5ab3d4669364de5ecb36240bb1ce0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
44a5ab3d4669364de5ecb36240bb1ce0N.exe
Resource
win10v2004-20240802-en
General
-
Target
44a5ab3d4669364de5ecb36240bb1ce0N.exe
-
Size
612KB
-
MD5
44a5ab3d4669364de5ecb36240bb1ce0
-
SHA1
2b4e698f29ee919167a96f1bfe43df5e3fbd355c
-
SHA256
b2055a7121904bfd226216e52700e1fd7417e8c08bd4dd8f3e85813c4c548834
-
SHA512
507ae3202d3e49cc08ddb9b601cf08dd388de51c327e3ac065b7f1513c6b9fc7334191678ee6d4f209a0b367755835ebf9caa520079c6ad17fb35c4e7aae5feb
-
SSDEEP
6144:NptVO7mOV1u9MV0ue9Ya47I9Ya4oXtamAV3vQnx04EFtUXMamoa9tG6tP/q8f/PI:NhEDfP/q8fmRYCKREDAY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44a5ab3d4669364de5ecb36240bb1ce0N.exe
Files
-
44a5ab3d4669364de5ecb36240bb1ce0N.exe.exe windows:4 windows x86 arch:x86
adebbb86b5e51804d4a099487dedb258
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapAlloc
IsBadReadPtr
CreateDirectoryW
GlobalUnlock
GlobalLock
GetModuleHandleA
user32
GetMessageA
CreateMenu
GetSystemMenu
GetClipboardOwner
FindWindowA
MessageBoxIndirectA
WinHelpA
InvalidateRect
SetWindowPos
GetClientRect
BeginPaint
SetWindowTextA
MsgWaitForMultipleObjects
IsWindow
CreateCaret
ShowCaret
HideCaret
DestroyCaret
EnableMenuItem
GetCursorPos
TrackPopupMenu
GetScrollInfo
ScreenToClient
GetKeyboardLayout
SetKeyboardState
ToUnicodeEx
ToAsciiEx
SetScrollInfo
GetMessageTime
PostMessageA
CheckMenuItem
FlashWindow
SetCaretPos
GetKeyboardState
LoadIconA
RegisterClassA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 560KB - Virtual size: 560KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE