Static task
static1
Behavioral task
behavioral1
Sample
74fbc20f6b313172894b59026cd26487.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74fbc20f6b313172894b59026cd26487.exe
Resource
win10v2004-20231222-en
General
-
Target
74fbc20f6b313172894b59026cd26487
-
Size
1.5MB
-
MD5
74fbc20f6b313172894b59026cd26487
-
SHA1
8e98f633e267ff274e7d704cb4761e4abcaeac64
-
SHA256
863e4ac79c2f1239d296ee68ab52071434223b99b7dd775ec374c5c50e4e4cbb
-
SHA512
fe8bd88cae46719b8c4942970c07d12bbfd86fa37c92096185fdddb0c3be4b6ee3ffd16f3d90fd4a93f8af9ab2665174002857cc079d1a330c07b935bbc19142
-
SSDEEP
49152:fyYfRRxb8F3QCmSq44lhyNpqlBdMWL1WwFbmf9:/HUQCjqjHXMWswFbmf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74fbc20f6b313172894b59026cd26487
Files
-
74fbc20f6b313172894b59026cd26487.exe windows:4 windows x86 arch:x86
e7404cdb7d9a01a8c495fd161bc8b2a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
FreeSid
OpenProcessToken
OpenServiceA
QueryServiceStatus
RegDeleteValueA
RegQueryInfoKeyA
RegQueryValueA
SetSecurityDescriptorDacl
StartServiceCtrlDispatcherA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindFirstFileA
FreeLibrary
GetACP
GetCPInfo
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableA
GetFileSize
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStdHandle
GetStringTypeA
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetWindowsDirectoryA
GlobalLock
GlobalReAlloc
HeapAlloc
HeapSize
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsDebuggerPresent
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalFree
MapViewOfFile
Module32Next
MoveFileA
MoveFileExA
OpenEventA
OpenProcess
QueryPerformanceCounter
RaiseException
RtlUnwind
SearchPathA
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFileAttributesA
SetFileTime
SetHandleCount
SetLastError
SetPriorityClass
SetUnhandledExceptionFilter
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
lstrcpynA
ole32
CLSIDFromProgID
CoCreateFreeThreadedMarshaler
CoRevokeClassObject
OleSaveToStream
PropVariantClear
user32
CallNextHookEx
CallWindowProcA
CharNextA
DestroyWindow
DialogBoxParamA
EndPaint
GetActiveWindow
GetMenuItemCount
GetSysColorBrush
GetSystemMetrics
GetWindowPlacement
InflateRect
IsIconic
IsWindow
LoadBitmapA
LoadCursorA
MessageBoxA
OffsetRect
PostMessageA
RegisterClassA
RegisterClipboardFormatA
SendDlgItemMessageA
SendMessageA
SetCapture
SetDlgItemInt
SetWindowRgn
TranslateMessage
WinHelpA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.4MB - Virtual size: 20.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ