Static task
static1
Behavioral task
behavioral1
Sample
72c779fc31cfb8eea130db01f855c0af.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72c779fc31cfb8eea130db01f855c0af.exe
Resource
win10v2004-20231222-en
General
-
Target
72c779fc31cfb8eea130db01f855c0af
-
Size
6KB
-
MD5
72c779fc31cfb8eea130db01f855c0af
-
SHA1
6e339e28103e768b6ad45fd68ad1c2efbfb09677
-
SHA256
6e0654e46e443abb03568973f5658a04bcfd696a6247ae6db2438c2681c65ca3
-
SHA512
99a2c16115b4d34020550c500be066f365ca1a4a394ca6c6d3a9b126e75a9d6511afcdddb68801ed54378e5688d183383aa0cd0db2077383755eadf3e8060b48
-
SSDEEP
96:c+savrBuMoS5azlg9gQQovbgRXZtmyf9tyAum9qKrLb1hC7:psavrQMoS5ulgqQQokhTTf9/Zvy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72c779fc31cfb8eea130db01f855c0af
Files
-
72c779fc31cfb8eea130db01f855c0af.exe windows:4 windows x86 arch:x86
18d595bd9a84fd2c48e394ac8315352a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
ExitProcess
GetExitCodeProcess
GetNumberOfConsoleInputEvents
GetTempFileNameA
IsBadHugeWritePtr
IsValidCodePage
LoadLibraryExW
ResetEvent
SetMailslotInfo
SignalObjectAndWait
advapi32
AccessCheck
CryptReleaseContext
GetSecurityInfoExW
RegUnLoadKeyW
SetEntriesInAclW
user32
AppendMenuA
CharNextW
CreateWindowStationA
DdeCreateDataHandle
DeferWindowPos
DrawMenuBarTemp
GetUserObjectInformationW
GetWindowModuleFileNameA
LoadBitmapW
LoadStringA
LookupIconIdFromDirectory
UnhookWindowsHookEx
WindowFromDC
wsprintfA
wsprintfW
Sections
.text Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE