Static task
static1
Behavioral task
behavioral1
Sample
98ad4eb4ef7fb8b8f6059afc2ee8fdb9b55b1d8e48a8642998bf400a8945004bN.exe
Resource
win7-20240708-en
General
-
Target
98ad4eb4ef7fb8b8f6059afc2ee8fdb9b55b1d8e48a8642998bf400a8945004bN.exe
-
Size
468KB
-
MD5
c4476b7a3276a6056c2bd45b997dc4e0
-
SHA1
27efa4cb4f7330f3ab37b9a1b0cd4405cc1c3285
-
SHA256
98ad4eb4ef7fb8b8f6059afc2ee8fdb9b55b1d8e48a8642998bf400a8945004b
-
SHA512
e45501dff58ba066e6be8674eb349fbd30adaa01ec191d31685dd6ad013f91f1e6fe2d2230f30bb72aaa10d3bae5740654e786cd40a173d7caeb0c813f648262
-
SSDEEP
6144:JEQNnsUlorKnIsljArv1iCJreBUcGr+wvTLY9Ij+DuTUgrMAVnRmrT:J7NsMorKIPrNBJCacGSgj+YrM8RmrT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98ad4eb4ef7fb8b8f6059afc2ee8fdb9b55b1d8e48a8642998bf400a8945004bN.exe
Files
-
98ad4eb4ef7fb8b8f6059afc2ee8fdb9b55b1d8e48a8642998bf400a8945004bN.exe.exe windows:4 windows x86 arch:x86
50f8a2255c4baf188eb0098c86160f78
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
GetProcAddress
GetModuleHandleExA
VirtualAlloc
user32
SetDlgItemTextA
DestroyWindow
DispatchMessageA
GetDlgItemTextA
SetWindowTextA
FindWindowA
PostQuitMessage
GetSystemMenu
AppendMenuA
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
DialogBoxParamA
TranslateMessage
gdi32
GetStockObject
msvcrt
exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
malloc
??3@YAXPAX@Z
_adjust_fdiv
_onexit
_exit
_XcptFilter
__dllonexit
_acmdln
__getmainargs
_initterm
__setusermatherr
msvcp60
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0Init@ios_base@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 432KB - Virtual size: 430KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ