Static task
static1
Behavioral task
behavioral1
Sample
24bb75c77d3c85a4077619ba3f04ba84.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24bb75c77d3c85a4077619ba3f04ba84.exe
Resource
win10v2004-20231215-en
General
-
Target
24bb75c77d3c85a4077619ba3f04ba84
-
Size
140KB
-
MD5
24bb75c77d3c85a4077619ba3f04ba84
-
SHA1
4edd86870445046680bfdcaf373fecc2effea6ce
-
SHA256
66c4860768a5d0b2b10eaf0133bd6e2bd4b9a64d198fd189db31f1750a7b5c80
-
SHA512
1e592a6cc35d89098ad3f389bd0dcdb798c67eb53d2f318aed7980db4b8587fc227ad7f7192995f1ce2fa9b304a6b33dccd3330b0ebb94c6dafa643aa1ca0b0a
-
SSDEEP
3072:57HI1EhwtqRbL2ws+krtztcH15KOPuqmVFk4e+L0EUmu:57HI1E2ybi9r8XKBqsFk4jS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24bb75c77d3c85a4077619ba3f04ba84
Files
-
24bb75c77d3c85a4077619ba3f04ba84.exe windows:4 windows x86 arch:x86
13e805eaf04b241dc6563d480404e1a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
LoadLibraryExW
lstrlenA
CreateFileW
GetCurrentThreadId
FindResourceW
PulseEvent
HeapCreate
GlobalUnlock
GetCurrentDirectoryA
LocalFree
SetLastError
Sleep
FindClose
GetModuleHandleA
CreateProcessA
GetCommandLineA
lstrcpyA
UnmapViewOfFile
GetComputerNameA
user32
FillRect
GetDlgItem
DispatchMessageA
CheckRadioButton
CallWindowProcA
CreateWindowExA
CreateIcon
DrawEdge
GetCaretPos
IsWindow
DrawMenuBar
GetDC
SetFocus
rsaenh
CPDeriveKey
CPGenKey
CPSignHash
CPDecrypt
CPHashData
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE