Static task
static1
Behavioral task
behavioral1
Sample
730a1f9aeabc15953610d8d0625ae8e1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
730a1f9aeabc15953610d8d0625ae8e1.exe
Resource
win10v2004-20231222-en
General
-
Target
730a1f9aeabc15953610d8d0625ae8e1
-
Size
71KB
-
MD5
730a1f9aeabc15953610d8d0625ae8e1
-
SHA1
a77d11322cd49a9b2b68372f34b6973aae185d8e
-
SHA256
29cdc4118717276a3e85425b25589622303cb1dda41226584f6808ed492769dd
-
SHA512
224e7412353aef855f22735b39cf61d1d18babee54dd96c01d5466cc66c6023fa051332b6c53d9194464034ad257babde14a2bdeaec7e74847adddd9410882dd
-
SSDEEP
1536:TH/7aCPDit0D7glqyWQDLQmbV8obSuzdk8hNlCBr6Fxie:D/2CPDixHWALC6bMr6Fxie
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 730a1f9aeabc15953610d8d0625ae8e1
Files
-
730a1f9aeabc15953610d8d0625ae8e1.exe windows:5 windows x86 arch:x86
e6083a20988f8d5836b4148e52ae0e63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
user32
ShowWindow
CreateWindowExW
RegisterClassW
LoadCursorW
LoadIconW
GetCursorPos
CloseWindow
DispatchMessageW
TranslateMessage
PeekMessageW
DefWindowProcW
UpdateWindow
UnregisterClassW
msvcrt
_snprintf
?terminate@@YAXXZ
_controlfp
__getmainargs
_ismbblead
time
localtime
free
memcmp
memmove
calloc
malloc
strtoul
strcpy
wcsstr
??3@YAXPAX@Z
memset
wcscpy
wcslen
memcpy
strlen
_snwprintf
strncpy
wcsncpy
_except_handler3
_vsnprintf
_vsnwprintf
__CxxFrameHandler
_cexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_XcptFilter
strcat
_exit
ntdll
RtlUnwind
kernel32
lstrcmpiW
GlobalMemoryStatus
LoadLibraryW
MoveFileW
CreateProcessW
GetTempPathW
GetTempFileNameW
GetFileSize
CreateFileW
SetFilePointerEx
MoveFileExW
DeleteFileW
GetDiskFreeSpaceExW
GetThreadTimes
UnmapViewOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedExchange
GetModuleFileNameW
GetModuleFileNameA
CreateFileA
WriteFile
FlushFileBuffers
GetExitCodeThread
CreateThread
ResumeThread
SetThreadPriority
GetCurrentThreadId
TlsSetValue
TlsGetValue
ReadProcessMemory
TlsAlloc
InterlockedCompareExchange
TlsFree
WideCharToMultiByte
MultiByteToWideChar
GetLastError
SetLastError
GetCurrentThread
CreateMutexW
CloseHandle
WaitForSingleObject
TerminateThread
LoadLibraryA
FreeLibrary
SetErrorMode
GetVersionExA
Sleep
GetModuleHandleA
GetCurrentProcess
GetVersion
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ