Static task
static1
Behavioral task
behavioral1
Sample
b7910ec9a09fe9b13bc72553a5d6cd3a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7910ec9a09fe9b13bc72553a5d6cd3a.exe
Resource
win10v2004-20240226-en
General
-
Target
b7910ec9a09fe9b13bc72553a5d6cd3a
-
Size
155KB
-
MD5
b7910ec9a09fe9b13bc72553a5d6cd3a
-
SHA1
78940c0e30a9064be69d5367530022fc5e192b16
-
SHA256
77eed4d45a1486788a19bddfbaa05115832b705fda33d3b76fe7e76fb6468bdd
-
SHA512
da6996abdb7312d39753dd25b72bd5fffdd71363d8c86337a871ed05307852fa88226a649076aef4d777738f43033293d680ba898dad4b6af79c2754af79f5a5
-
SSDEEP
3072:ItZT7c7T1x4demK1TAzBSWJRrCwTNhfiZ1zYSNUvm:Ib2pKdwaz4WTe+Nh6ZhYS/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7910ec9a09fe9b13bc72553a5d6cd3a
Files
-
b7910ec9a09fe9b13bc72553a5d6cd3a.exe windows:4 windows x86 arch:x86
c44234d439e63c580dfcd417cee26c73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DialogBoxParamA
CopyRect
IsMenu
IsWindow
GetWindowTextA
LoadMenuA
CloseWindow
AppendMenuW
GetFocus
DrawIconEx
GetDlgItem
GetWindowTextLengthA
BeginPaint
AppendMenuA
CopyImage
BlockInput
GetDC
CalcMenuBar
EndDialog
kernel32
ExitThread
OpenFile
ExitProcess
GetLastError
CreateDirectoryA
CopyFileExW
GetFileType
GetCPInfo
AddAtomA
GetCommandLineA
FatalExit
FlushFileBuffers
ReadFile
FindClose
DeleteFileA
DeleteAtom
GetPriorityClass
GetStdHandle
DeleteFileW
GetLocalTime
FreeResource
OpenFileMappingA
CopyFileExA
WriteFile
FindAtomA
FindAtomW
GetFileTime
CopyFileA
AddAtomW
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 110KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ