Static task
static1
Behavioral task
behavioral1
Sample
74a7d7e87e54645bfffd64e951d7b6a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74a7d7e87e54645bfffd64e951d7b6a3.exe
Resource
win10v2004-20231215-en
General
-
Target
74a7d7e87e54645bfffd64e951d7b6a3
-
Size
63KB
-
MD5
74a7d7e87e54645bfffd64e951d7b6a3
-
SHA1
60f6f2037dde4dfec11f73b81f24e029691b6d13
-
SHA256
b82e660048996eb312f9c02906107c5b990a6e6ff7b38b5b435cbffff8e4dbd8
-
SHA512
b1894ed9be21df3de185c7e8ba472c03a1c9af09f83c7fbb483046305d16b4add4b20b66d3869eedaee2f5a95416636d21000e8e73e541994b9db707dd64bb59
-
SSDEEP
1536:uVY1JYMGIegnIQl4mPr8h5HVcqtgRr7JyVnXxsq:uq1VGIwo4Gr8vHyqteKV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74a7d7e87e54645bfffd64e951d7b6a3
Files
-
74a7d7e87e54645bfffd64e951d7b6a3.exe windows:4 windows x86 arch:x86
1bedd5d3586e490fbdd2bded02cbf1af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawIcon
CloseDesktop
GetDlgItemTextA
CloseWindowStation
GetKeyState
GetKeyboardState
OpenDesktopA
GetWindowTextA
GetIconInfo
ExitWindowsEx
GetDlgItem
GetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
OpenWindowStationA
ToUnicode
GetWindowThreadProcessId
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathMatchSpecW
StrCmpNIW
wnsprintfW
wnsprintfA
StrCmpNIA
wvnsprintfW
PathFileExistsW
SHDeleteKeyA
kernel32
VirtualProtect
GlobalLock
GetModuleHandleA
FindClose
lstrcatA
GetCommandLineA
lstrcatW
lstrcpyA
VirtualAlloc
CreateProcessW
SetFilePointer
OpenMutexW
lstrcpyW
GetFileTime
LoadLibraryA
lstrlenA
GetFileAttributesA
advapi32
RegSetValueExA
DuplicateTokenEx
CryptAcquireContextW
CryptCreateHash
RegQueryValueExA
RegCreateKeyExA
CryptDestroyHash
RegEnumKeyExA
RegCloseKey
GetUserNameW
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE