Static task
static1
Behavioral task
behavioral1
Sample
0725ed006fadf1d75b1c6ada41847542.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0725ed006fadf1d75b1c6ada41847542.exe
Resource
win10v2004-20231215-en
General
-
Target
0725ed006fadf1d75b1c6ada41847542
-
Size
391KB
-
MD5
0725ed006fadf1d75b1c6ada41847542
-
SHA1
721f7cf284adfcd5047f14a0bc91e47d0ac01b9b
-
SHA256
26e981aa6d3ea42ef87dd111d5b0079e34006563c45f42339e7c6e50fb3d4dd6
-
SHA512
6a9d6b813fb3468539ca42da4e15a87d599d0aeaa6c7859316ddf255d4277e41b98caee50b90ac4bb55a4e9004c7a3ce78fe68c8cad76b8a2a76f34890b6c5a9
-
SSDEEP
12288:3zARMhHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:URMhkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0725ed006fadf1d75b1c6ada41847542
Files
-
0725ed006fadf1d75b1c6ada41847542.exe windows:4 windows x86 arch:x86
b2c082fa56873630949a31292a3196bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
TlsGetValue
ReleaseMutex
InitializeCriticalSection
WriteFile
FindClose
GlobalFlags
IsBadStringPtrW
GetFileTime
GetCurrentProcessId
lstrlenW
GetDriveTypeA
CreateEventW
HeapCreate
GetEnvironmentVariableW
FindAtomA
GetCurrentThreadId
GetPrivateProfileStringA
ReleaseMutex
LoadLibraryW
user32
SetFocus
DrawStateW
CallWindowProcW
CreateWindowExA
GetSysColor
GetClientRect
DrawTextA
DispatchMessageA
GetKeyboardType
EndDialog
IsWindow
GetSysColor
GetClassInfoA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ