Static task
static1
Behavioral task
behavioral1
Sample
0f0c54de496f565c4bd2909cd6645a553dce4c5a929c48d06aba16f1e5f5a145.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0f0c54de496f565c4bd2909cd6645a553dce4c5a929c48d06aba16f1e5f5a145.exe
Resource
win11-20240508-en
General
-
Target
0f0c54de496f565c4bd2909cd6645a553dce4c5a929c48d06aba16f1e5f5a145
-
Size
5.5MB
-
MD5
cbeea25cedfd923fb447c178ffa8633f
-
SHA1
287698fe730f648429c537431df61d41c4ebbb31
-
SHA256
0f0c54de496f565c4bd2909cd6645a553dce4c5a929c48d06aba16f1e5f5a145
-
SHA512
21beff55c494615648036477d62d8a33951a8811dee7a45a490e84b40bb018ca8395fb58f4e7469c0ce27a98ed49f2e4835c876d5e9d2b144efcaaaeac6ebe12
-
SSDEEP
98304:CwCLY0ejXCdN97viphY83JRu1KvEGrXPX1wPbwNU/FH4elRQZZrcQn0TXmqt7I9b:H+Y0emdNR6x3/frfX1wPkNUFRbQZZ70y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0f0c54de496f565c4bd2909cd6645a553dce4c5a929c48d06aba16f1e5f5a145
Files
-
0f0c54de496f565c4bd2909cd6645a553dce4c5a929c48d06aba16f1e5f5a145.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ