Static task
static1
Behavioral task
behavioral1
Sample
74178a719b5fd7a7fa278adc673f9f70.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74178a719b5fd7a7fa278adc673f9f70.exe
Resource
win10v2004-20231215-en
General
-
Target
74178a719b5fd7a7fa278adc673f9f70
-
Size
158KB
-
MD5
74178a719b5fd7a7fa278adc673f9f70
-
SHA1
570b28ca07fb589fcf781938b4e5b441131e2b79
-
SHA256
3a35ad96c6357418a816725e0af4fc1c6b5cc44720632259dbeb15be073ff2d9
-
SHA512
e3a637b912d77be9b3627a21f98d9fa972610ed45e4309bf2fbb66ba9e0864513c864936e74c728edbafe9be408d588ce8667dc46cb137d0eb9e8b5faa003786
-
SSDEEP
3072:FzMcjBEcqgTUrsphY4nihbufRRB9rFoiGaWF/m6x04TxQB0p:FtUiGKY4niGzeK6y4KA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74178a719b5fd7a7fa278adc673f9f70
Files
-
74178a719b5fd7a7fa278adc673f9f70.exe windows:5 windows x86 arch:x86
33b8ad80772cc5757d6809b9e93f892f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadContext
CreateMutexW
SetThreadContext
FindResourceW
CallNamedPipeA
LoadResource
FlushConsoleInputBuffer
OpenSemaphoreA
SetCommBreak
_lclose
VirtualFree
GetCurrencyFormatA
EnumTimeFormatsW
EnumResourceTypesA
SizeofResource
ReadProcessMemory
FormatMessageW
InitAtomTable
GetFileAttributesA
CreateSemaphoreA
CreateProcessA
GetModuleFileNameW
GetBinaryTypeW
CompareStringW
GetDevicePowerState
IsBadStringPtrA
GetConsoleOutputCP
OpenMutexW
SetLastError
GetProcAddress
VirtualAlloc
VirtualAllocEx
GetProcessVersion
GetFileType
LockResource
SetProcessWorkingSetSize
GetModuleFileNameA
GetModuleHandleA
LoadLibraryExA
SetThreadAffinityMask
LocalSize
GlobalAddAtomW
GetThreadTimes
WriteProcessMemory
ResumeThread
HeapSize
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
GetLastError
InterlockedDecrement
SetUnhandledExceptionFilter
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
LoadLibraryW
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapAlloc
IsProcessorFeaturePresent
user32
CreateWindowExW
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ