Static task
static1
Behavioral task
behavioral1
Sample
5df3f4f079941795ac54a5aa556bcb30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5df3f4f079941795ac54a5aa556bcb30N.exe
Resource
win10v2004-20240802-en
General
-
Target
5df3f4f079941795ac54a5aa556bcb30N.exe
-
Size
108KB
-
MD5
5df3f4f079941795ac54a5aa556bcb30
-
SHA1
b2fff479cfc267952819c462b0ebb5a4b0c1fd4e
-
SHA256
4a11aecb0abf2e724f9a3df6822a94cbccb6b388e528912c12a5d11cf1ce1eb7
-
SHA512
b4ce439ce7681fad29bcf2645cc60f0b6e8212fd51433de345caf17ab86d2d4cf2417e7305b9c956f7a80da869e2c965a94189a2e63afc96d7cf00e869e257e8
-
SSDEEP
1536:N8GTABJo/6KsQF2NjV4g2fPM4kMrksvlUhJ5GDFpx7Rz:CHovsQF2NCg2fPMArk8kJ5GB5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5df3f4f079941795ac54a5aa556bcb30N.exe
Files
-
5df3f4f079941795ac54a5aa556bcb30N.exe.exe windows:4 windows x86 arch:x86
f06baa81475ba38baa7ead5c74285bf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
FindResourceA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ