Static task
static1
Behavioral task
behavioral1
Sample
7f74362e198176432c8fa303879e25bc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f74362e198176432c8fa303879e25bc.exe
Resource
win10v2004-20231215-en
General
-
Target
7f74362e198176432c8fa303879e25bc
-
Size
402KB
-
MD5
7f74362e198176432c8fa303879e25bc
-
SHA1
21af02e88f9e77194da36fc6f1cac512de57bfb2
-
SHA256
bba1e0d25795b39f4c38cd1f2e928f0ab3611a1533e462263a8925ac1d22dd87
-
SHA512
4d605dd896915de6d8eecb2a696ad4f3a03e1a8dcc80e8ebcbc713bdf93adc077c328ab7db49e976d58368c4ed8d73ad3ae0b8c0d1d0a93c148ce5ab1800d77d
-
SSDEEP
12288:dReIM2ztunLdD0F2kgcI6nnXtkly2thOTgTo00aEzxhLID:KxLdDknnnXst8T2H3khL8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f74362e198176432c8fa303879e25bc
Files
-
7f74362e198176432c8fa303879e25bc.exe windows:4 windows x86 arch:x86
22a92b2716146df41f7bcbea12dcdc9b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
GdiPlayScript
GetMiterLimit
GetICMProfileA
CreateRectRgnIndirect
GetCharWidthA
ArcTo
EnumICMProfilesW
ExtTextOutW
SetTextCharacterExtra
GetEnhMetaFileBits
GetSystemPaletteEntries
SetViewportOrgEx
SetMetaRgn
CopyMetaFileW
advapi32
CryptGetDefaultProviderA
CryptGetHashParam
CryptDuplicateHash
CryptSetProviderA
RegDeleteValueA
wininet
GetUrlCacheConfigInfoA
InternetGoOnline
InternetAutodial
InternetGetLastResponseInfoA
InternetGetConnectedStateEx
SetUrlCacheEntryGroup
FindFirstUrlCacheContainerW
user32
FlashWindowEx
TranslateAccelerator
SetMessageExtraInfo
DdeGetLastError
CreateIconFromResourceEx
TranslateAcceleratorA
ShowWindowAsync
BroadcastSystemMessageA
LoadMenuW
CascadeChildWindows
DdeConnectList
UnionRect
SystemParametersInfoA
SetShellWindow
GetSubMenu
ShowOwnedPopups
InvertRect
GetWindowLongW
ValidateRgn
PostMessageA
MessageBeep
kernel32
EnumTimeFormatsW
GetModuleFileNameA
HeapFree
VirtualAlloc
LoadLibraryA
GetCurrentProcess
VirtualAllocEx
GetCurrentThreadId
GetTickCount
InterlockedExchange
VirtualQueryEx
SetCurrentDirectoryA
GetTimeZoneInformation
ExitProcess
GetFileSize
MultiByteToWideChar
QueryPerformanceCounter
TerminateProcess
GetTempPathA
GetSystemTimeAsFileTime
GetStringTypeExA
GetCurrentProcessId
GetProcAddress
HeapReAlloc
HeapAlloc
VirtualQuery
GetEnvironmentStringsW
RtlUnwind
GetModuleHandleA
GetStringTypeA
IsValidCodePage
ContinueDebugEvent
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ