Static task
static1
Behavioral task
behavioral1
Sample
74f4d0a64f211531c39dcad5d52de344.exe
Resource
win7-20231215-en
General
-
Target
74f4d0a64f211531c39dcad5d52de344
-
Size
336KB
-
MD5
74f4d0a64f211531c39dcad5d52de344
-
SHA1
09552893e36f9b4f877727e87b769448756210ca
-
SHA256
9b6123adeb52369e94535b21f5b06472322351835cea616dea12182aa70be0ea
-
SHA512
fa725287b47542340ef60181df5551cfc428d9c85a9ed1b393d338eeef616010aa2ecbb63e52f3571c45ea3bd43c3fb7d27c72269402727bc6689ad010aa95de
-
SSDEEP
6144:1VtqJlbDKzr9NV0g5jvz2lefPGQYc5jYzjp5Tzau:bgJlbDKP9Ne6QzjkuphW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74f4d0a64f211531c39dcad5d52de344
Files
-
74f4d0a64f211531c39dcad5d52de344.exe windows:4 windows x86 arch:x86
23d48ff736b1bb05d9dfebdb1fb7452b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadMenuIndirectA
GetDlgCtrlID
SetWindowTextW
CreateCaret
GetWindowModuleFileNameW
GetCursorInfo
GetLastActivePopup
SetProcessDefaultLayout
GetMenuDefaultItem
MapVirtualKeyExW
SetDoubleClickTime
UnhookWindowsHookEx
CharNextExA
GetWindowWord
EnumPropsA
EnumPropsW
ChangeClipboardChain
GetTabbedTextExtentW
CallMsgFilter
GetUserObjectInformationW
SetMenuContextHelpId
RegisterClassExA
IsDialogMessage
CreateWindowStationA
GetMonitorInfoA
InsertMenuA
SetUserObjectSecurity
IsDialogMessageA
EnumDisplaySettingsExW
DefWindowProcW
DdeAccessData
RemoveMenu
CloseWindow
GetDlgItem
CreateDialogIndirectParamA
MessageBoxA
GetDoubleClickTime
wsprintfW
LoadIconW
GetMenuItemInfoW
IsWindow
RegisterClassA
GetSystemMenu
GetCursorPos
InflateRect
GetCursor
ChildWindowFromPoint
IsZoomed
ShowWindow
WinHelpA
InSendMessageEx
HideCaret
CallWindowProcA
ClipCursor
ChangeDisplaySettingsExW
DestroyWindow
GetInputDesktop
SendMessageTimeoutW
CreateWindowExW
comctl32
ImageList_Read
ImageList_Duplicate
DrawStatusText
ImageList_DragLeave
ImageList_LoadImageW
ImageList_LoadImageA
CreateToolbar
InitCommonControlsEx
ImageList_Merge
advapi32
RegQueryMultipleValuesW
RegLoadKeyW
RegSetValueW
CryptSetHashParam
kernel32
ExitProcess
HeapSize
InterlockedExchange
VirtualQuery
RtlUnwind
GetTickCount
EnumSystemLocalesA
GetCurrentDirectoryA
WriteConsoleOutputW
GetStartupInfoW
TlsFree
LeaveCriticalSection
OpenMutexA
SetFilePointer
GetStartupInfoA
GetLocaleInfoA
SetEnvironmentVariableA
FlushFileBuffers
IsBadWritePtr
GetCurrentThreadId
LCMapStringA
GetProcAddress
GetLastError
CreateMutexA
GetCurrentProcessId
GetModuleFileNameW
GetLogicalDrives
IsValidCodePage
WideCharToMultiByte
WriteFile
CompareStringW
GetUserDefaultLCID
MultiByteToWideChar
HeapAlloc
GetEnvironmentStrings
HeapCreate
GetDriveTypeW
SetLastError
TlsAlloc
FreeEnvironmentStringsW
CompareStringA
GetEnvironmentStringsW
GetSystemInfo
GetDateFormatA
InitializeCriticalSection
SetHandleCount
GetCommandLineW
GetTimeZoneInformation
TlsSetValue
GetOEMCP
GetCurrentProcess
FreeEnvironmentStringsA
QueryPerformanceCounter
EnterCriticalSection
GetFileType
GetACP
DeleteCriticalSection
GetStringTypeW
ReadFile
GetStringTypeA
GetVersionExA
CloseHandle
LCMapStringW
UnhandledExceptionFilter
GetCommandLineA
GetTimeFormatA
HeapReAlloc
GetModuleHandleA
TlsGetValue
LoadLibraryA
VirtualProtect
GetCPInfo
IsValidLocale
VirtualAlloc
TerminateProcess
HeapFree
GetSystemTimeAsFileTime
GetLocaleInfoW
GetStdHandle
GetCurrentThread
HeapDestroy
SetStdHandle
VirtualFree
OpenFileMappingW
GetModuleFileNameA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ