Static task
static1
Behavioral task
behavioral1
Sample
741fd8fac54d7752157ddae1f786f116.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
741fd8fac54d7752157ddae1f786f116.exe
Resource
win10v2004-20231222-en
General
-
Target
741fd8fac54d7752157ddae1f786f116
-
Size
16.5MB
-
MD5
741fd8fac54d7752157ddae1f786f116
-
SHA1
68e4ae293e8e350928453540c533e441c4db5efb
-
SHA256
5e31343e7fc4643d3da71273c8fe8bf811798a425374cf15e5108812839c8821
-
SHA512
3bfcf85bed6bea5c639b0a2ebc0e4281cd72c287759ee8a0d11b0e023e954a50d58dedf979001f18ede5cf51c54b34b7e3fab4ec5d1f219986fcd32cf9fd5d52
-
SSDEEP
393216:xqIGFAHiIHuECKmhGfcsaSwDjgxwAqFjHszpnjl1MIIvyfg:xqFAHiIHuWr9AjcwfFTsp5Yj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 741fd8fac54d7752157ddae1f786f116
Files
-
741fd8fac54d7752157ddae1f786f116.exe windows:4 windows x86 arch:x86
cc3d30310a2c54cf61fa03ce1e77e3de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
FindExecutableA
user32
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetWindowLongA
SetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
DialogBoxIndirectParamA
GetDlgItemTextA
EndDialog
GetWindowRect
BeginPaint
SetWindowPos
GetKeyState
CharUpperBuffA
SetTimer
KillTimer
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
GetDlgItem
InvalidateRect
OemToCharBuffA
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
MessageBoxA
SetCursor
CharNextA
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
GetSystemMetrics
kernel32
lstrlenA
SetStdHandle
GetLocaleInfoA
GetSystemInfo
VirtualProtect
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
LoadLibraryA
GetStringTypeW
GetStringTypeA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
FindClose
FindFirstFileA
GetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
GetEnvironmentVariableA
GlobalFree
GlobalUnlock
GlobalHandle
_lclose
_llseek
_lread
GlobalLock
GlobalAlloc
LocalFree
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
ExitProcess
CloseHandle
CreateFileA
SetCurrentDirectoryA
FlushFileBuffers
_lcreat
GetVolumeInformationA
GetWindowsDirectoryA
SetFilePointer
WinExec
_lwrite
lstrcmpiA
SetErrorMode
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStdHandle
gdi32
SelectObject
SetTextAlign
SetBkColor
SetTextColor
DeleteObject
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 18.7MB - Virtual size: 18.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ