Static task
static1
Behavioral task
behavioral1
Sample
714be4a686dc3dccf93e11ff7fcb2360.exe
Resource
win7-20231215-en
General
-
Target
714be4a686dc3dccf93e11ff7fcb2360
-
Size
160KB
-
MD5
714be4a686dc3dccf93e11ff7fcb2360
-
SHA1
db1d90e9cf2c978f3412df34249e2502a374ae8f
-
SHA256
57d702ec1d9c8833cde974a0a74ac4d6d0a6fe238df53989bf693a7f9be3a393
-
SHA512
f9804b67a33777b94e5e16348c22eb6e535ef4b9df4b751b4e697735c7e70099d805ee3e0503a4941bd8f7ca15e2233681b678545c997fbde9d1a87f8e27b4ac
-
SSDEEP
3072:JThO5xPJWDlP+um+gAj+h0sB0r2mypSl3kPG59EA0p1RVZ0:jQWAtlBCTljEA0p7c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 714be4a686dc3dccf93e11ff7fcb2360
Files
-
714be4a686dc3dccf93e11ff7fcb2360.exe windows:4 windows x86 arch:x86
43353f4a0bc4a4445d57e63d7c0e3205
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
GetSaveFileNameA
GetSaveFileNameW
WantArrows
ChooseColorA
user32
GetSystemMetrics
SetWindowPlacement
EnableWindow
kernel32
GetStartupInfoA
GetOEMCP
lstrcpyA
ResetEvent
OutputDebugStringA
LocalShrink
HeapCreate
HeapAlloc
GlobalUnWire
ClearCommBreak
CloseHandle
CompareFileTime
CreateFileW
DebugBreak
DeleteFileW
EnumLanguageGroupLocalesW
ExitProcess
FindFirstVolumeMountPointA
GetACP
GetCommandLineA
GetCurrencyFormatA
GetDefaultCommConfigW
GetModuleHandleA
GetVersionExA
ole32
CLSIDFromString
CoBuildVersion
CoCreateGuid
CoCreateInstance
CoFileTimeNow
CoGetMalloc
CoTaskMemAlloc
CoTaskMemFree
CreateAntiMoniker
StringFromGUID2
dbghelp
StackWalk
comctl32
FlatSB_GetScrollRange
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE