Static task
static1
Behavioral task
behavioral1
Sample
34ab90b40e1bd8d451e998aa677114f6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
34ab90b40e1bd8d451e998aa677114f6.exe
Resource
win10v2004-20231215-en
General
-
Target
34ab90b40e1bd8d451e998aa677114f6
-
Size
374KB
-
MD5
34ab90b40e1bd8d451e998aa677114f6
-
SHA1
839daca67545c7da158906762577c4beae70991c
-
SHA256
26b05b6563f23bffab45f4f9f4f625a52651dfb14d9ec09fcf5f1699c7e5735d
-
SHA512
d0b4f3f807d2b8d9c6ea65dda8422f49cfc64ca754622d9a7470a9d5eab226745611c3e45dc12e74e091ba7dc57c0b24b8cc6a5ed93568788cddbbb0fa2bdb4e
-
SSDEEP
6144:WAVl4RMv7KP9EoxGcTYNh91DQJ7w6Mcx8MYeWKnEWYzXTz+VNypJOVglH5fDsf1D:BmRMvFL9/u5Wcxr8/frTzcNS0G3fDsft
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34ab90b40e1bd8d451e998aa677114f6
Files
-
34ab90b40e1bd8d451e998aa677114f6.exe windows:4 windows x86 arch:x86
2b168030004297df8c92c04a65069864
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
GetCurrentThreadId
HeapCreate
ReadFile
LocalFlags
CreateEventW
GetPrivateProfileStringA
LocalFree
lstrlenW
GetDriveTypeW
InitializeCriticalSection
GetEnvironmentVariableW
TlsGetValue
FindClose
LoadLibraryW
GetConsoleAliasA
GetCurrentProcessId
FindAtomA
ResumeThread
SuspendThread
user32
CreateWindowExA
GetClientRect
GetKeyboardType
IsWindow
GetSysColor
DrawStateW
EndDialog
GetClassInfoA
CallWindowProcW
GetSysColor
SetFocus
DispatchMessageA
DrawTextA
srclient
EnableSR
EnableSR
EnableSR
EnableSR
EnableSR
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ