Static task
static1
Behavioral task
behavioral1
Sample
375afc5ba7f98d0a4a2130d72a134322.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
375afc5ba7f98d0a4a2130d72a134322.exe
Resource
win10v2004-20231215-en
General
-
Target
375afc5ba7f98d0a4a2130d72a134322
-
Size
251KB
-
MD5
375afc5ba7f98d0a4a2130d72a134322
-
SHA1
f7cda1f24a423f24edaee05ca93b90746fcc4c85
-
SHA256
4bd18b671b713362e19a9519d4e06d44539db39580b43d363cf8bfdde56addaf
-
SHA512
153bc97719d970862a3cef908109d54682bb574ffa4405db9b3043235ae7969b2f48aa1196836156f33c76707cc3b277a0a2fc37c9808f1d780100812e564b22
-
SSDEEP
6144:+QG7CveZj5zDDa/AOfsqDst7L4HaryXBGC:/Gx5PDa/Yqn6ruBGC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 375afc5ba7f98d0a4a2130d72a134322
Files
-
375afc5ba7f98d0a4a2130d72a134322.exe windows:4 windows x86 arch:x86
e0cfa38a69277861c19ba84b90671660
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
GetModuleHandleA
CreateEventA
GetVersionExA
GlobalFree
GetTickCount
lstrcatA
LocalAlloc
gdi32
GetTextMetricsA
GetTextColor
SelectObject
SetPixel
DeleteObject
GetBkColor
msvcrt
_except_handler3
__set_app_type
__p__fmode
wcschr
__setusermatherr
wcstoul
memmove
_exit
_controlfp
_c_exit
__getmainargs
_XcptFilter
__CxxFrameHandler
_acmdln
rand
exit
user32
DestroyWindow
MessageBoxA
EndDialog
PostQuitMessage
SetFocus
ScreenToClient
SetWindowTextA
GetWindowRect
EndPaint
BeginPaint
LoadIconA
TranslateMessage
GetMessageA
DispatchMessageA
ShowWindow
DefWindowProcA
GetSysColor
DialogBoxParamA
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 238KB - Virtual size: 823KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ