Static task
static1
Behavioral task
behavioral1
Sample
74a80571bba0069f64d531028502ca5a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74a80571bba0069f64d531028502ca5a.exe
Resource
win10v2004-20231222-en
General
-
Target
74a80571bba0069f64d531028502ca5a
-
Size
60KB
-
MD5
74a80571bba0069f64d531028502ca5a
-
SHA1
b0572e77489c037b575d6a276af151e9af7f17d1
-
SHA256
a1f9fd80f5563534498036ba4f322107c9bf635a04d10ea1fff95ae4b77bdf68
-
SHA512
a321691c3ff7cda5d063fed9a88347cfc38c2b6263cecb89819df8835bd62505117148b57ac70baac3bf1ed5b8c8d34ae0315ee154562e8b268f9bd707404c2c
-
SSDEEP
1536:7RKb0capEiTUFVMfPa9dzAf2/sDb1gixhJR0BT:7I3qTcVgS9q2a1RJR0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74a80571bba0069f64d531028502ca5a
Files
-
74a80571bba0069f64d531028502ca5a.exe windows:4 windows x86 arch:x86
fa536997d688c3e12decae6fa40f1d85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrcpyA
GetShortPathNameA
GetEnvironmentVariableA
ReleaseMutex
WaitForSingleObject
CreateMutexA
GetSystemDirectoryA
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
msvcrt
free
strcpy
strlen
fclose
fwrite
fopen
malloc
strcmp
strcat
memset
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
calloc
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ