Static task
static1
Behavioral task
behavioral1
Sample
ce8cda9f3dfa460f5dde320d7b6fcbebcf350b4a6d608e008fe8c33c22988f83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce8cda9f3dfa460f5dde320d7b6fcbebcf350b4a6d608e008fe8c33c22988f83.exe
Resource
win10v2004-20240802-en
General
-
Target
ce8cda9f3dfa460f5dde320d7b6fcbebcf350b4a6d608e008fe8c33c22988f83
-
Size
302KB
-
MD5
3a9864e34d9a63e7467363ec442e250f
-
SHA1
9de010075b4e261633b70e2478f4941b600f43b9
-
SHA256
ce8cda9f3dfa460f5dde320d7b6fcbebcf350b4a6d608e008fe8c33c22988f83
-
SHA512
cbc5398470ecdbbbffa0296a9e8b6bb1e36e0107401957582c62f89260e2fbc57895abb162ee84b09a20443392508adbc9f3d4a1671bccfd3f1bf64fa145a201
-
SSDEEP
6144:CJlWTQXs31lALDBwFcC6nt/HVNVoi0567mZ/CMHX/5jaT1NH:eNXSlASj6t/HV8iU/zHxjaRp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce8cda9f3dfa460f5dde320d7b6fcbebcf350b4a6d608e008fe8c33c22988f83
Files
-
ce8cda9f3dfa460f5dde320d7b6fcbebcf350b4a6d608e008fe8c33c22988f83.exe windows:4 windows x86 arch:x86
79b3362178937bf9559741c46bb9e035
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
Sections
.text Size: - Virtual size: 14KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 22KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 528B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.k Size: 259KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ