Static task
static1
Behavioral task
behavioral1
Sample
285a0fe09de561c9a020c58e0ecb51a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
285a0fe09de561c9a020c58e0ecb51a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
285a0fe09de561c9a020c58e0ecb51a0N.exe
-
Size
464KB
-
MD5
285a0fe09de561c9a020c58e0ecb51a0
-
SHA1
86776bf0c089b25756eafcda99c34041a99fa8ba
-
SHA256
455be6c500ecec0b7d2dfdd41ef023dd7506fde29c74c8f199af727d26e0c941
-
SHA512
487082b256d0c2d4ed71a652b2fef9c785519a2a49eda8a322c26eb6cefaac83eb1a753f6739e0b8dbd285f3675097a9ed0456629cdfe8a6ce3cbc71e6e71833
-
SSDEEP
12288:jglc87eqqV5e+wBV6O+ieHTAEdIfvll9lDT:jgSqqHeVBx0LdMl9lDT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 285a0fe09de561c9a020c58e0ecb51a0N.exe
Files
-
285a0fe09de561c9a020c58e0ecb51a0N.exe.exe windows:5 windows x86 arch:x86
efca855c5fac5cb74b1010e36b345f46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
oleaut32
VarBstrFromI1
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l2 Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE