Static task
static1
Behavioral task
behavioral1
Sample
08c40ab7448acfae51a34aaddaa82600N.exe
Resource
win7-20240903-en
General
-
Target
08c40ab7448acfae51a34aaddaa82600N
-
Size
6.5MB
-
MD5
08c40ab7448acfae51a34aaddaa82600
-
SHA1
c9ba9b57523ea180cdf3cbaa6620802f6de6587d
-
SHA256
4e3e2c4babeba80382aa4767ba0d22665896a5f5c0d90334dcb817ddbcd52589
-
SHA512
6b8db1e55e9ed296ca8ac9d808ea5c5666979f9bbd88da054b35a032a2a0ee86729aca51db4f066e6aef7638282bf2c008c0f76aa91449c6cdb417ab4a0a22f6
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSQ:i0LrA2kHKQHNk3og9unipQyOaOQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08c40ab7448acfae51a34aaddaa82600N
Files
-
08c40ab7448acfae51a34aaddaa82600N.exe windows:5 windows x86 arch:x86
e67de27d95c2ad38958459b1acb7ebea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetVersionExA
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
LoadStringW
CharUpperBuffW
advapi32
RegQueryValueExW
shell32
ShellExecuteW
ws2_32
htonl
iphlpapi
GetAdaptersInfo
Sections
.text Size: - Virtual size: 656KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.?xL Size: - Virtual size: 504KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.htext Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.-(H Size: - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.R*O Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Jk) Size: 6.4MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ