Static task
static1
Behavioral task
behavioral1
Sample
49cd7643f3cb5e6c2b4bb93971979da336464d3c4a2a14bd6c11acc89351fa9dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49cd7643f3cb5e6c2b4bb93971979da336464d3c4a2a14bd6c11acc89351fa9dN.exe
Resource
win10v2004-20240802-en
General
-
Target
49cd7643f3cb5e6c2b4bb93971979da336464d3c4a2a14bd6c11acc89351fa9dN.exe
-
Size
115KB
-
MD5
e9b6be16380d6a1a9cf498d5105a7040
-
SHA1
8f91a053ca3ea0f2db0cc019748897078cf1e8b2
-
SHA256
49cd7643f3cb5e6c2b4bb93971979da336464d3c4a2a14bd6c11acc89351fa9d
-
SHA512
0f36b400b90a4f7bc826893aba56f0f7c1dec21d70e6f2d6a63050008ea93941d2f75865c3b443de1555e2a1dba1094a3ace63e7ad5bb09fc482cf1624f9b677
-
SSDEEP
3072:df/vMVckYZFyt14OEKmBN9tHDW5WHg8/8jNrvZQ//jjL/XM:dHvfcEKgLHDW5S8jRSPjM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49cd7643f3cb5e6c2b4bb93971979da336464d3c4a2a14bd6c11acc89351fa9dN.exe
Files
-
49cd7643f3cb5e6c2b4bb93971979da336464d3c4a2a14bd6c11acc89351fa9dN.exe.exe windows:5 windows x86 arch:x86
310686d326614ec58e3fda2567358fbe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetThreadLocale
VirtualFree
Sleep
ExitProcess
user32
GetDesktopWindow
Sections
.text Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Dhdysyaf Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Jcpxyk K Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Lurs Kxk Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 239B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE