Static task
static1
Behavioral task
behavioral1
Sample
7335411a5653d04027ac46050a2919a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7335411a5653d04027ac46050a2919a4.exe
Resource
win10v2004-20231222-en
General
-
Target
7335411a5653d04027ac46050a2919a4
-
Size
7KB
-
MD5
7335411a5653d04027ac46050a2919a4
-
SHA1
e7f9deffee9952177381a5c2698e8dd51511c81f
-
SHA256
e0cd0fb4912231465df2850583ce1145a2ca3043fc8a786044029d0353b7587f
-
SHA512
6497b065cd84aecee82b4224708e600e8dc05c0ef1b9a25cd4336354b931d9e56d761287c2c122a939aa67a19adec2dd65a99894c8c20a7c8b74101eba619135
-
SSDEEP
48:iB+3+CSZHqi3yuzXevr95sgX/tfxQ44QvURetcsEz4bdoBBPsjRt4l+SuKi/lGwn:k+u/Ki3yuDEh5R/tF8RMcoq/qtYI/P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7335411a5653d04027ac46050a2919a4
Files
-
7335411a5653d04027ac46050a2919a4.exe windows:4 windows x86 arch:x86
c8d9025f7debc5327c4805b9c2cb9d28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowTextA
MessageBoxA
GetDlgItemTextA
GetDlgItem
DialogBoxParamA
kernel32
GlobalFree
GetModuleHandleA
WriteFile
SetFilePointer
CloseHandle
CreateFileA
ExitProcess
GetFileSize
GlobalAlloc
GetTickCount
ReadFile
comdlg32
GetOpenFileNameA
shell32
ShellExecuteA
Sections
.Hack Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Rootkit Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Anti Size: 512B - Virtual size: 693B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Plus Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Pvt Size: 30B - Virtual size: 30B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Admin Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE