Static task
static1
Behavioral task
behavioral1
Sample
374cfe5e4c03e5c27478a37d7aeb32b4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
374cfe5e4c03e5c27478a37d7aeb32b4.exe
Resource
win10v2004-20231222-en
General
-
Target
374cfe5e4c03e5c27478a37d7aeb32b4
-
Size
391KB
-
MD5
374cfe5e4c03e5c27478a37d7aeb32b4
-
SHA1
aeba6373fb2a326ca5eb027cb45fc515958b8008
-
SHA256
1841b33c323b2342b566533c61e7719eed387f913a392a41dc5d0861a895ca03
-
SHA512
eb0cba7c88d7cc8178eb39cffc1deae27e001f16879acb63bbbea65b9a544e7e4d145eab1af0a9aa654c7992f52888b96e379854b81cce397f4528a1ad73155b
-
SSDEEP
6144:qzC+FxAgek1C3EpduJFYRjTuaJfrv/0wEfYC9TbyrMiMDeEic2U9uKZE89qx1:qzxFe6CFkZZVryf9RlDLiPUwKLqx1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 374cfe5e4c03e5c27478a37d7aeb32b4
Files
-
374cfe5e4c03e5c27478a37d7aeb32b4.exe windows:4 windows x86 arch:x86
8d1a9a6fc1f7b9a2f86651a0ba1d24f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateFileA
GetConsoleCP
GetACP
FreeEnvironmentStringsA
GetConsoleAliasA
TlsGetValue
LocalLock
GetCalendarInfoA
LocalUnlock
HeapCreate
LocalFree
FindAtomA
FindClose
CloseHandle
CreateFileMappingA
WaitForSingleObject
GetModuleHandleA
IsDebuggerPresent
LoadLibraryExA
user32
SetFocus
DrawEdge
GetIconInfo
DefWindowProcA
DispatchMessageA
IsWindow
GetDlgItem
CascadeWindows
GetMessageA
GetDC
DrawTextA
CallWindowProcA
CreateDialogParamA
DrawIconEx
msasn1
ASN1BERDecEoid
ASN1BERDecBool
ASN1BEREncLength
ASN1BEREncFlush
ASN1BERDecCheck
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ