Static task
static1
Behavioral task
behavioral1
Sample
073f5add14e34a6a8eededdd904348ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
073f5add14e34a6a8eededdd904348ac.exe
Resource
win10v2004-20231222-en
General
-
Target
073f5add14e34a6a8eededdd904348ac
-
Size
504KB
-
MD5
073f5add14e34a6a8eededdd904348ac
-
SHA1
a42ce5099cc8e2a0d02067f925eca2bad1c9f995
-
SHA256
4f94aaeb369efc24af7b504c92865be314e886023bc6498a4d71cbfbb6ddceed
-
SHA512
abc2b32d506a751d626e7ad7ae4563ef90330f497aa71c189e41e9769e43e43077a5a6d46a317985f65c1aef6269f2c4629ca4f225b42d9674c5013c1e299944
-
SSDEEP
12288:M2kUBdYiIda0BgVfhGxhhVpwdHGQb33FV5:ZHWw07XwFV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 073f5add14e34a6a8eededdd904348ac
Files
-
073f5add14e34a6a8eededdd904348ac.exe windows:4 windows x86 arch:x86
c299695c1e53e53a18c9bc70c63be8d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
VirtualAlloc
Sleep
GetCurrentProcessId
VirtualFree
FlushFileBuffers
HeapDestroy
VirtualQuery
ResetEvent
GetProcAddress
GetSystemInfo
VirtualProtect
RtlUnwind
GetLocaleInfoA
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
RaiseException
LCMapStringA
MultiByteToWideChar
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
GetStringTypeA
GetStringTypeW
user32
LoadBitmapA
EnumWindows
LoadIconA
IsZoomed
gdi32
GetPixel
shell32
DuplicateIcon
netapi32
RxNetAccessDel
psapi
GetProcessMemoryInfo
msvfw32
ICOpen
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 420KB - Virtual size: 712KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ