Static task
static1
Behavioral task
behavioral1
Sample
04d767470ec27729c990f6f76e95b1f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04d767470ec27729c990f6f76e95b1f5.exe
Resource
win10v2004-20231222-en
General
-
Target
04d767470ec27729c990f6f76e95b1f5
-
Size
815KB
-
MD5
04d767470ec27729c990f6f76e95b1f5
-
SHA1
20b3cce1f6bafd69c341a4c0e12f187ccf360a97
-
SHA256
4c1ce2d88e6ef1a1e02d51329ac303a9bfaf7a86308a0dc303f2a0fc4f6c6e81
-
SHA512
5074dd89b3e131573f563e4357318d2168f8c4fe83586b09b8dd9981783c3e26888935934289b56ba3581ac7e4d047dfaea7a734087af237a393991be5d76248
-
SSDEEP
12288:Xa6m5BvvxatKhQtY3O/DkdGPctFIV7/hV/yJjNh5nTtT3/VhkQC/FcBTLzu+pX:XaNVatKhh3O7krIvVuZTtLVhkF/FcBlX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04d767470ec27729c990f6f76e95b1f5
Files
-
04d767470ec27729c990f6f76e95b1f5.exe windows:4 windows x86 arch:x86
42a7d71409e17f67f66126b9c9052e58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GlobalLock
GetStdHandle
FindClose
IsBadReadPtr
GetConsoleCP
GetFullPathNameA
GetACP
CreateFileA
IsDebuggerPresent
LocalFree
TlsGetValue
LoadLibraryExA
HeapCreate
CreateFileMappingA
LocalUnlock
CloseHandle
CreateEventA
GetLastError
GetModuleHandleA
user32
EmptyClipboard
GetDlgItem
SetFocus
PostMessageA
EndDialog
DefWindowProcA
ScrollWindow
DispatchMessageA
GetMessageA
IsWindow
GetIconInfo
GetDC
CreateDialogParamA
DrawIconEx
uxtheme
DrawThemeIcon
CloseThemeData
GetThemeMetric
GetThemeColor
EnableTheming
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ