Static task
static1
Behavioral task
behavioral1
Sample
ce64d963e35b5148101587240e4f7010N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce64d963e35b5148101587240e4f7010N.exe
Resource
win10v2004-20240802-en
General
-
Target
ce64d963e35b5148101587240e4f7010N
-
Size
88KB
-
MD5
ce64d963e35b5148101587240e4f7010
-
SHA1
ee72b815f5ca67cc785f462480887dc0923a4476
-
SHA256
a778ade95de850db81d660c99dd4ca7eadcabfbd8c512b4391b7970388dce22b
-
SHA512
fdcfe0b9d9b03c990e1061aa8fecf595f863df602d3f59ea20d031d719f5ffabd8908a18d627f475eb4b9c44765c0217432db83da08e0fc3b78398c8ca7173b6
-
SSDEEP
1536:dO0fy3IXptSQTO2tCH5RV3izQ//rXVCA:dYEtxTOSCN3aQ/DXn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce64d963e35b5148101587240e4f7010N
Files
-
ce64d963e35b5148101587240e4f7010N.exe windows:4 windows x86 arch:x86
af798ede715e584e454871596a2b8e72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetConsoleTitleA
SetLastError
LoadLibraryExW
GetDiskFreeSpaceExA
CancelIo
ResetEvent
IsBadStringPtrA
VirtualProtect
LocalFree
FreeConsole
Heap32First
GetLastError
GetCommandLineA
GetStdHandle
EnumResourceTypesW
CloseHandle
IsBadReadPtr
GetModuleHandleA
TlsGetValue
user32
CopyImage
GetScrollBarInfo
IsIconic
DispatchMessageA
DragDetect
CreateWindowExA
DialogBoxParamA
CloseWindow
GetUpdateRect
GetMessageA
CreateMenu
GetKeyState
EnableWindow
hlink
HlinkClone
HlinkCreateFromData
HlinkCreateFromString
HlinkOnNavigate
HlinkNavigate
advapi32
RegCloseKey
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE