Static task
static1
Behavioral task
behavioral1
Sample
dba027cc3f7413eb06156ecef0965bb0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dba027cc3f7413eb06156ecef0965bb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
dba027cc3f7413eb06156ecef0965bb0N.exe
-
Size
44KB
-
MD5
dba027cc3f7413eb06156ecef0965bb0
-
SHA1
a9ad725aaf7b1d87262deecfddd71e1b66c3678b
-
SHA256
177732c586c894036866f1cf00cd92bb89c7715ef39aad965da7106646dbd9f4
-
SHA512
135d920c1ae4e78c0e4e497d3298853f473c2b51238f3258008d19701418cff57fb793ccab2c8bcdd62dc2afe975bc925e8d52a1f4d703b782437caa935dbbdc
-
SSDEEP
768:A/E+UlejKbjWwKtUZS6KUAghE3c1ng8o6dlZYs288q7i:AC2tUZdHAMEyngBIS98T7i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dba027cc3f7413eb06156ecef0965bb0N.exe
Files
-
dba027cc3f7413eb06156ecef0965bb0N.exe.exe windows:4 windows x86 arch:x86
13169adaa55a4b4676c2eeddc904744e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_controlfp
_except_handler3
__set_app_type
_XcptFilter
__p__fmode
_exit
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
user32
PostQuitMessage
DialogBoxParamA
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
kernel32
lstrcpynA
GetFileType
CloseHandle
FindNextFileA
GetFileSize
DeleteFileA
FindFirstFileA
GetModuleHandleA
CreateFileA
GetStartupInfoA
GetLogicalDriveStringsA
GetEnvironmentStringsA
FindClose
GetModuleFileNameA
gdi32
CreateFontIndirectA
comctl32
ord17
shfolder
SHGetFolderPathA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ