Static task
static1
Behavioral task
behavioral1
Sample
050b5bf5f79731adec19db17edad6c70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
050b5bf5f79731adec19db17edad6c70N.exe
Resource
win10v2004-20240802-en
General
-
Target
050b5bf5f79731adec19db17edad6c70N.exe
-
Size
504KB
-
MD5
050b5bf5f79731adec19db17edad6c70
-
SHA1
061faf89068e960ab089dcdcc8a79909e9d1edc6
-
SHA256
10ccc48deb4c98124b395353e89bfef9ed41dec1ad744f49c857723a3f7f8c94
-
SHA512
16c0e83b57cfa3a99039a481aefbe60a29aa7532c7ab90d286b651c5dce864e11eb18b78355d5c7ebd44a118053b48afbd2165c69382151f1f94ab5ffdc267be
-
SSDEEP
6144:JI7GiIQmUdFsq+dsrLjvE/I0axUb3BVB2QV9a+tpLWOjjscikIMpMVQSIea28EgV:wlhDsq5/lUbvfpLRe+1NEg0Y23NdDM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 050b5bf5f79731adec19db17edad6c70N.exe
Files
-
050b5bf5f79731adec19db17edad6c70N.exe.exe windows:4 windows x86 arch:x86
e4a48d4093442cddd5a11523c94015e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RemoveDirectoryA
Beep
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
LoadCursorA
DispatchMessageA
PeekMessageA
SetCursor
MessageBoxA
wsprintfA
shell32
ShellExecuteA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ