Static task
static1
Behavioral task
behavioral1
Sample
d40e7ba9234ac2ee9c779c997fe39400N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d40e7ba9234ac2ee9c779c997fe39400N.exe
Resource
win10v2004-20240802-en
General
-
Target
d40e7ba9234ac2ee9c779c997fe39400N.exe
-
Size
45KB
-
MD5
d40e7ba9234ac2ee9c779c997fe39400
-
SHA1
28aba62f73814e431c5504069d6d7462cbb09f6c
-
SHA256
dc1b48658cf2e23cae3395b6df6810ad22a6fc375bc3041ce709cb7233bfd7ab
-
SHA512
6c45270c3b3abc75fb6b7505d61f51ebff7293783e95828bf16fd8435149f34bbe5877e9b5e6b5510e623ae74d5948844af8d9e96fd5983cd4f97d449559ed2e
-
SSDEEP
768:jIUXurlyOrKR1EMTa1CVUEQApZNF7IDeIOrk:jUrlJeaMm1+8A7NF7IiJA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d40e7ba9234ac2ee9c779c997fe39400N.exe
Files
-
d40e7ba9234ac2ee9c779c997fe39400N.exe.exe windows:4 windows x86 arch:x86
0c144496adf6d6951a8195019d714846
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
GetModuleFileNameA
GetProcessHeap
HeapAlloc
ReadFile
SetFileAttributesA
SetFilePointer
WriteFile
Sections
.text Size: 1024B - Virtual size: 768B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE