Static task
static1
Behavioral task
behavioral1
Sample
74e25d0d3e95464ca8f4bfef2f71d46a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74e25d0d3e95464ca8f4bfef2f71d46a.exe
Resource
win10v2004-20231215-en
General
-
Target
74e25d0d3e95464ca8f4bfef2f71d46a
-
Size
32KB
-
MD5
74e25d0d3e95464ca8f4bfef2f71d46a
-
SHA1
4520dad2040d784c970a1fc2174748ae70b0e36a
-
SHA256
baf93dd1739c73cb22f01b306cbf924fe1ad084dd5380b9359005555be19cfa0
-
SHA512
bff8d0d2c4fd2246378799fbca0ff37945ddb07fffb6c56c16ed4193cdb3fe6d4d942e25423761d99bacce232d24bf777903bd1c30e8766b6787236ba0cdc4b9
-
SSDEEP
768:VFa80tcEzIqGvpvDd/twj5LfkzqHZ/yKD:VFap6EzIqGvpvDt+tkzkAKD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74e25d0d3e95464ca8f4bfef2f71d46a
Files
-
74e25d0d3e95464ca8f4bfef2f71d46a.exe windows:5 windows x86 arch:x86
2e923817cd9ef220e8ca5ced17da5124
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
Module32Next
IsBadCodePtr
GetConsoleAliasesLengthA
ReadConsoleA
GetFileAttributesA
MoveFileWithProgressA
DuplicateHandle
VirtualAllocEx
GetCurrentThread
SetDllDirectoryA
WideCharToMultiByte
BeginUpdateResourceA
GetTapePosition
GetConsoleCP
GetStdHandle
GetThreadLocale
FindResourceExA
WaitForMultipleObjects
OpenSemaphoreA
DebugBreak
AddAtomA
CopyFileExW
OpenEventA
SetFileShortNameA
SetComputerNameExW
GetConsoleCursorMode
WaitNamedPipeA
GetConsoleInputExeNameA
VirtualQueryEx
GetConsoleAliasesA
VirtualFree
FlushViewOfFile
GlobalDeleteAtom
GetThreadPriorityBoost
GetCurrentDirectoryA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ