Static task
static1
Behavioral task
behavioral1
Sample
0ca7e4e2370222568caa22bcd20e6410ea61fb704054727d4c49e669df6a792c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ca7e4e2370222568caa22bcd20e6410ea61fb704054727d4c49e669df6a792c.exe
Resource
win10v2004-20240802-en
General
-
Target
0ca7e4e2370222568caa22bcd20e6410ea61fb704054727d4c49e669df6a792c
-
Size
24KB
-
MD5
3e3abb851d28401bc2060587cf3a3908
-
SHA1
b2cb87344f2c8d2463a570eaf3bf05ce59200dd6
-
SHA256
0ca7e4e2370222568caa22bcd20e6410ea61fb704054727d4c49e669df6a792c
-
SHA512
a277c19d0ee39ad2326a430a111b8bca108063a764623c069035c4543bdbebe8b213f71ff58b22ecb4dabd555d734692e373b56985237af9df67200435b4bf13
-
SSDEEP
192:TJdes9Z5rM9GY25QbKVKgZF38qDx5HE0Fpxctzh08PzeaMBGE4XtkTUCz3VtHGaU:T6cPvNpxvqefBdwtkTUCrPHZAH+769
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ca7e4e2370222568caa22bcd20e6410ea61fb704054727d4c49e669df6a792c
Files
-
0ca7e4e2370222568caa22bcd20e6410ea61fb704054727d4c49e669df6a792c.exe windows:4 windows x86 arch:x86
817fafd0a5f10b469613271a41128d1c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostQuitMessage
DestroyWindow
BeginPaint
EndPaint
SendMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
kernel32
GetCommandLineA
GetModuleHandleA
ExitProcess
HeapAlloc
GetStartupInfoA
lstrcpynA
GetFileSize
GetProcessHeap
lstrcatA
CreateFileA
ReadFile
CloseHandle
comctl32
ord17
msvcrt
_itoa
atoi
atof
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 996B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ