Static task
static1
Behavioral task
behavioral1
Sample
163e01454cde70539009b236175d4b9a6814732161042c8cd78d0c0c14a2ca61.exe
Resource
win7-20240903-en
General
-
Target
163e01454cde70539009b236175d4b9a6814732161042c8cd78d0c0c14a2ca61
-
Size
55KB
-
MD5
0380f71ecd0968fbf61c40ad60c4aef1
-
SHA1
d39bc1b54a8cad59cf8a8bd2789834204a931997
-
SHA256
163e01454cde70539009b236175d4b9a6814732161042c8cd78d0c0c14a2ca61
-
SHA512
46c92b30c384efd00c0751f0c88649e96963879eea98fdb60cd635f0fcb94c280de78f8c4eca520684f6fccf9f1fde8f0b1dc3e20f873679e5087ad2be65981c
-
SSDEEP
1536:qw788avzI+on+TqOK0cHMqtzMLvWsrupwnTf1GqT7u:qwda7KVr0cHneunw1u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 163e01454cde70539009b236175d4b9a6814732161042c8cd78d0c0c14a2ca61
Files
-
163e01454cde70539009b236175d4b9a6814732161042c8cd78d0c0c14a2ca61.exe windows:5 windows x86 arch:x86
b892955ae494fe908bdf52e81e1dfa4c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
user32
EndPaint
advapi32
RegCloseKey
shell32
ShellExecuteA
ws2_32
WSAStartup
iphlpapi
GetAdaptersAddresses
Sections
POLSJDKW Size: - Virtual size: 136KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
POLSJDKW Size: 54KB - Virtual size: 56KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE