Static task
static1
Behavioral task
behavioral1
Sample
721dd2ab5ecac817ce1274b89d8b7b31.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
721dd2ab5ecac817ce1274b89d8b7b31.exe
Resource
win10v2004-20231215-en
General
-
Target
721dd2ab5ecac817ce1274b89d8b7b31
-
Size
576KB
-
MD5
721dd2ab5ecac817ce1274b89d8b7b31
-
SHA1
84005446feefe9d5e6516cde0be43f4ada447151
-
SHA256
efcd17a7eebd448d6e4edb984b7d11390c4ffa1746a6bb8ddd585532bb72893b
-
SHA512
77f5e813e885369666889a17b26414d59fb1b0d1f3639bad37a0ad6b95a3d011169ca1e0600b3be11a120d28d40f6210b3f0a4dc4112959c143922013b0919cb
-
SSDEEP
12288:PtbwaVl0gjsIj9YTeTxX723Asdr+Lx8AMIcCP9AJtAC:VM6l0gjZj9YTeTxLIxI6hryAfV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 721dd2ab5ecac817ce1274b89d8b7b31
Files
-
721dd2ab5ecac817ce1274b89d8b7b31.exe windows:4 windows x86 arch:x86
146e57ff1a9543df39330208e5ddbe4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHFreeNameMappings
ExtractIconExA
FindExecutableW
SHGetPathFromIDListA
CommandLineToArgvW
comdlg32
ReplaceTextA
GetOpenFileNameA
user32
GetClassWord
RemovePropA
SetDlgItemInt
RegisterClassExA
TranslateAcceleratorW
InsertMenuW
GetScrollPos
AppendMenuW
EndDeferWindowPos
SwapMouseButton
DefDlgProcW
DdeClientTransaction
DrawFrameControl
SetCursor
DialogBoxParamW
ReplyMessage
CheckMenuRadioItem
GetInputDesktop
GetWindowContextHelpId
GetMenuItemInfoA
GetDialogBaseUnits
SetActiveWindow
MapVirtualKeyExW
EnumDisplaySettingsExW
RegisterClassA
EnumDisplayMonitors
kernel32
HeapReAlloc
EnumSystemLocalesA
UnhandledExceptionFilter
GetFileAttributesExW
GetUserDefaultLCID
HeapCreate
GetCurrentThread
VirtualAlloc
IsValidCodePage
UnlockFile
VirtualQuery
FlushFileBuffers
FreeEnvironmentStringsW
WriteFile
OpenSemaphoreW
GetLastError
GetCurrentProcess
QueryPerformanceCounter
FreeEnvironmentStringsA
SetEnvironmentVariableA
GetACP
DeleteAtom
SetFilePointer
ExitProcess
GetVersionExA
SetLastError
GetStdHandle
CloseHandle
HeapFree
LoadLibraryA
GetModuleFileNameA
GetTimeZoneInformation
TlsGetValue
GetCurrentDirectoryW
HeapDestroy
DosDateTimeToFileTime
GetSystemInfo
VirtualFree
InterlockedExchange
UnmapViewOfFile
SetHandleCount
GetTimeFormatA
GetStartupInfoA
GetEnvironmentStringsW
PulseEvent
GetLocaleInfoW
GetCommandLineA
LCMapStringW
TlsSetValue
GetOEMCP
DeleteCriticalSection
GetFileType
GetModuleHandleA
OpenMutexA
GetTickCount
TlsFree
WideCharToMultiByte
RtlUnwind
GetStringTypeA
EnterCriticalSection
GetConsoleTitleW
HeapAlloc
ReadFile
GetDateFormatA
LCMapStringA
GetCPInfo
InitializeCriticalSection
LeaveCriticalSection
CreateThread
SetStdHandle
GetSystemTimeAsFileTime
GetEnvironmentStrings
GlobalAlloc
TlsAlloc
GetProcAddress
TryEnterCriticalSection
IsBadWritePtr
VirtualProtect
GetDiskFreeSpaceW
CompareStringA
CreateMutexA
GetLocaleInfoA
CompareStringW
MultiByteToWideChar
HeapSize
TerminateProcess
EnumCalendarInfoW
GetStringTypeW
IsValidLocale
EnumSystemCodePagesA
GetCurrentThreadId
GetCurrentProcessId
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ