Static task
static1
Behavioral task
behavioral1
Sample
f568d74495126039216976f9e4e1b1f3852f06f9c1abeef9932207e90a154f4eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f568d74495126039216976f9e4e1b1f3852f06f9c1abeef9932207e90a154f4eN.exe
Resource
win10v2004-20240802-en
General
-
Target
f568d74495126039216976f9e4e1b1f3852f06f9c1abeef9932207e90a154f4eN
-
Size
25KB
-
MD5
1441d2b2c307b374da881a870cc59f70
-
SHA1
be7b15c236a96c723189986ad1ec559fe1a16ca3
-
SHA256
f568d74495126039216976f9e4e1b1f3852f06f9c1abeef9932207e90a154f4e
-
SHA512
326239935082947f94441b35167fce2812aa1b0a601480fb035b64b3f04e72889bd26ebd4811ca1c16c6a199f2537b8fbf144d53dc08305cf235ee3cd9ca1083
-
SSDEEP
192:aEziYIk7VQ5ANWF5shCC0dbYzfmuPMoDlUvDje2A2z4puuLTEef3sfrpEBgOWtap:aENVb0db0+69lCS2N4pkGk3YMo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f568d74495126039216976f9e4e1b1f3852f06f9c1abeef9932207e90a154f4eN
Files
-
f568d74495126039216976f9e4e1b1f3852f06f9c1abeef9932207e90a154f4eN.exe windows:4 windows x86 arch:x86
e74c31d11e7570d6571da70016af25f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcW
PostQuitMessage
SendMessageW
CreateWindowExW
ShowWindow
UpdateWindow
LoadCursorA
LoadIconA
RegisterClassExW
LoadStringA
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyWindow
LoadAcceleratorsW
kernel32
GetModuleHandleA
ExitProcess
GetCommandLineA
HeapAlloc
GetProcessHeap
lstrcpynW
CloseHandle
GetStartupInfoA
ReadFile
CreateFileMappingW
comctl32
InitCommonControlsEx
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1002B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ