Static task
static1
Behavioral task
behavioral1
Sample
40374a2d6ec9d1d43c4c53bfe80ef37719302148108ba8c5f560807e0a6ef2bc.exe
Resource
win7-20230712-en
General
-
Target
40374a2d6ec9d1d43c4c53bfe80ef37719302148108ba8c5f560807e0a6ef2bc
-
Size
7.9MB
-
MD5
f59dd0ad342e5feedeb4ebcb3b8089d0
-
SHA1
bfff19e9f0213c5a36353a5432e22e1795d4f3f8
-
SHA256
40374a2d6ec9d1d43c4c53bfe80ef37719302148108ba8c5f560807e0a6ef2bc
-
SHA512
c209baaf902f8658545f5a737e92d40e213c89361c516a0ba8cfe188d3b69701d7cfaa410d55c25abeeaccb589bd2927b502621a9a524cd6ff0f2a682c12d87d
-
SSDEEP
196608:27iZh41pCV5L/r5G5Cgp41pZ2aGO2WrpDNAnAJE3n6:2qhipCH/NGRp4Aa7rVN0AJE36
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40374a2d6ec9d1d43c4c53bfe80ef37719302148108ba8c5f560807e0a6ef2bc
Files
-
40374a2d6ec9d1d43c4c53bfe80ef37719302148108ba8c5f560807e0a6ef2bc.exe windows x86
55ed19d9718c5ab8e323e66eed85f672
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
rasapi32
RasHangUpA
kernel32
SetFilePointer
user32
GetMenu
gdi32
GetViewportExtEx
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
shell32
ShellExecuteA
ole32
OleRun
oleaut32
UnRegisterTypeLi
comctl32
ImageList_GetIcon
wininet
InternetCloseHandle
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 6.9MB - Virtual size: 26.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1008KB - Virtual size: 1008KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ