Static task
static1
Behavioral task
behavioral1
Sample
6516f0bf0f9b81f0c431a78befd0a7d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6516f0bf0f9b81f0c431a78befd0a7d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6516f0bf0f9b81f0c431a78befd0a7d0N.exe
-
Size
43KB
-
MD5
6516f0bf0f9b81f0c431a78befd0a7d0
-
SHA1
f0b987a05c56f3fded73f5df0d19d3486e04e786
-
SHA256
067c052c9add13689414aef0bbd7da184d8cb5e51a9ae6520a659a16c80a262c
-
SHA512
520a767856e4b5e3441308b2d84ed02b7be186392f71d234b03f23e9b11d50d99512226a5ea27590929abc918188e41a4354d3b29d38a6d8fcc7dd6165029bbf
-
SSDEEP
768:A/E+UlejKbjWwKtUZS6KUAghE3c1ng8o6dlZYsKKQ:AC2tUZdHAMEyngBISpP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6516f0bf0f9b81f0c431a78befd0a7d0N.exe
Files
-
6516f0bf0f9b81f0c431a78befd0a7d0N.exe.exe windows:4 windows x86 arch:x86
13169adaa55a4b4676c2eeddc904744e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_controlfp
_except_handler3
__set_app_type
_XcptFilter
__p__fmode
_exit
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
user32
PostQuitMessage
DialogBoxParamA
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
kernel32
lstrcpynA
GetFileType
CloseHandle
FindNextFileA
GetFileSize
DeleteFileA
FindFirstFileA
GetModuleHandleA
CreateFileA
GetStartupInfoA
GetLogicalDriveStringsA
GetEnvironmentStringsA
FindClose
GetModuleFileNameA
gdi32
CreateFontIndirectA
comctl32
ord17
shfolder
SHGetFolderPathA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ