Static task
static1
Behavioral task
behavioral1
Sample
42df22d7a7c74fb910ae38eb6bb6b710N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42df22d7a7c74fb910ae38eb6bb6b710N.exe
Resource
win10v2004-20240802-en
General
-
Target
42df22d7a7c74fb910ae38eb6bb6b710N.exe
-
Size
43KB
-
MD5
42df22d7a7c74fb910ae38eb6bb6b710
-
SHA1
f21dd8736c02a0d13d17e9f0c55920dd946873c6
-
SHA256
6a2f4172c606889bdc8508ca9a2ae940c313083985d269590afa4b919e0faf06
-
SHA512
e3bbc4e404dd0b373b2f9b07d007b25f6ebed610d52e2ed285879f48b6ec74ab6fd50fe8eac5ef600101c53ddee5cc863e065a2f13a80ac854b5c03a5ad0afe8
-
SSDEEP
768:A/E+UlejKbjWwKtUZS6KUAghE3c1ng8o6dlZYs9g1:AC2tUZdHAMEyngBISE4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42df22d7a7c74fb910ae38eb6bb6b710N.exe
Files
-
42df22d7a7c74fb910ae38eb6bb6b710N.exe.exe windows:4 windows x86 arch:x86
13169adaa55a4b4676c2eeddc904744e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__p__commode
_controlfp
_except_handler3
__set_app_type
_XcptFilter
__p__fmode
_exit
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
user32
PostQuitMessage
DialogBoxParamA
DestroyWindow
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
kernel32
lstrcpynA
GetFileType
CloseHandle
FindNextFileA
GetFileSize
DeleteFileA
FindFirstFileA
GetModuleHandleA
CreateFileA
GetStartupInfoA
GetLogicalDriveStringsA
GetEnvironmentStringsA
FindClose
GetModuleFileNameA
gdi32
CreateFontIndirectA
comctl32
ord17
shfolder
SHGetFolderPathA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ