Static task
static1
Behavioral task
behavioral1
Sample
744151567dbd288c59fb7d3b48bbbda241a475c467867be78d2dac3fbd9abee0.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
744151567dbd288c59fb7d3b48bbbda241a475c467867be78d2dac3fbd9abee0.exe
Resource
win10v2004-20230703-en
General
-
Target
744151567dbd288c59fb7d3b48bbbda241a475c467867be78d2dac3fbd9abee0
-
Size
1.9MB
-
MD5
74946fd2f584b69e4016eee8ea98e996
-
SHA1
e888699f4ddb5865a811c6df63f48acfefbd5aa4
-
SHA256
744151567dbd288c59fb7d3b48bbbda241a475c467867be78d2dac3fbd9abee0
-
SHA512
88dd0dbe0ef9dbcc2c8900f72ced1434a6e6b2619b388aacce66553ce96954188d27af07c55cec9810267f541462d9e8b588bf210fba2450b95bad042a0073d2
-
SSDEEP
49152:J5I2ZxTS0idpUPhmGUZOlSkEnxh930JrXoE6VAZHKTl26Mn:XPxkpUPhmGUZWSkE2Jr4E6VAoTI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 744151567dbd288c59fb7d3b48bbbda241a475c467867be78d2dac3fbd9abee0
Files
-
744151567dbd288c59fb7d3b48bbbda241a475c467867be78d2dac3fbd9abee0.exe windows x86
e0684852489dc700f85b3dbf934928e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
wininet
InternetSetStatusCallbackW
user32
DrawFrameControl
gdi32
GetRgnBox
msimg32
AlphaBlend
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
advapi32
ChangeServiceConfigW
shell32
SHGetDesktopFolder
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsW
ole32
DoDragDrop
oleaut32
VarBstrFromDate
setupapi
CM_Get_Parent
winmm
timeEndPeriod
version
GetFileVersionInfoW
dbghelp
MiniDumpWriteDump
netapi32
NetWkstaGetInfo
wintrust
CryptCATAdminAcquireContext
crypt32
CertFindCertificateInStore
oleacc
AccessibleObjectFromWindow
imm32
ImmGetOpenStatus
Sections
.text Size: 1.9MB - Virtual size: 7.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE