Static task
static1
Behavioral task
behavioral1
Sample
779439a1f0d5c71b922f3f188364a272.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
779439a1f0d5c71b922f3f188364a272.exe
Resource
win10v2004-20231215-en
General
-
Target
779439a1f0d5c71b922f3f188364a272
-
Size
208KB
-
MD5
779439a1f0d5c71b922f3f188364a272
-
SHA1
1385c78d46b8dd57a74a6333483d9128851421fd
-
SHA256
e2037ead53b237f6836995ad8281b62c5efd2c27516320367093b6e814dc9317
-
SHA512
3fd0a72e176ac243662f98bf4fe403d81fe577063c3ae34b4792a0461667453ed940b5d97c21dd8de43f18c65568a1d594b9d752ef95a1ab7a79a65191531302
-
SSDEEP
3072:8UVBV0CtrXk/Ly8ehdH4FcGlpKCBNAjf2q1C3sSTnLL0gHDociO0/WVyYVsbiH5k:zVBXtruW8//rKC/Mz1C3sSTnvziJ+Xc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 779439a1f0d5c71b922f3f188364a272
Files
-
779439a1f0d5c71b922f3f188364a272.exe windows:4 windows x86 arch:x86
16bcfc692437b3f8196d1eef0a0b2c70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathA
DeleteCriticalSection
TlsGetValue
GetModuleHandleA
ExitProcess
FindAtomA
VirtualProtect
FindVolumeClose
FindResourceExA
GetCalendarInfoA
CreateThread
GetTickCount
CloseHandle
Sleep
SetEvent
lstrlenA
GetDiskFreeSpaceA
ReleaseMutex
GetLastError
FindClose
user32
CreateMenu
EndDialog
IsIconic
EnableWindow
GetKeyState
CloseWindow
GetUpdateRect
GetScrollBarInfo
GetMessageA
DispatchMessageA
CopyImage
DragDetect
DialogBoxParamA
CreateWindowExA
msdmo
DMOGetName
DMOGetTypes
DMOUnregister
DMORegister
DMOEnum
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ