Static task
static1
Behavioral task
behavioral1
Sample
04e7288bb72a8b4495a616daa3c62cd9624c3f753c046a0e03432423b34bddd3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
04e7288bb72a8b4495a616daa3c62cd9624c3f753c046a0e03432423b34bddd3.exe
Resource
win10v2004-20240226-en
General
-
Target
04e7288bb72a8b4495a616daa3c62cd9624c3f753c046a0e03432423b34bddd3
-
Size
127KB
-
MD5
1346e9628f262646e7d28c03af6f6ded
-
SHA1
6c5242a692b50402ee1054f6e4601a17dc64bd14
-
SHA256
04e7288bb72a8b4495a616daa3c62cd9624c3f753c046a0e03432423b34bddd3
-
SHA512
fb6dd39a753168c7569e68640dd6bc05e7acf1d5c6c46e42980938c2d4e88da473aa99fe8599108d8afeedc3f9a732ec4ff116f408610c3f4c3be17209c54c91
-
SSDEEP
3072:TfdyV4ZjVTutEa1HODbZmbvLifnKMOdF2reTWkIKA:TYV4v4EyU1mbL+nqd0K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04e7288bb72a8b4495a616daa3c62cd9624c3f753c046a0e03432423b34bddd3
Files
-
04e7288bb72a8b4495a616daa3c62cd9624c3f753c046a0e03432423b34bddd3.exe windows:4 windows x86 arch:x86
37e7a3636960443948445eb98cf42998
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageW
IsWindowEnabled
EnableWindow
GetKeyState
CheckMenuItem
PostMessageW
SetMenu
GetWindowLongW
CreateDialogIndirectParamW
SetActiveWindow
LoadBitmapW
GetFocus
ModifyMenuW
IsWindow
GetNextDlgTabItem
PostQuitMessage
GetMenuCheckMarkDimensions
GetParent
GetDesktopWindow
SetWindowPos
IsWindowVisible
DestroyWindow
SetWindowContextHelpId
PeekMessageW
EnableMenuItem
InvalidateRgn
GetSysColorBrush
GetCursorPos
UpdateWindow
IsIconic
GetNextDlgGroupItem
ValidateRect
SetMenuItemBitmaps
MapDialogRect
DrawIcon
GetActiveWindow
GetDlgItem
EndDialog
CreateWindowExW
GetWindow
MessageBeep
GetSystemMetrics
GetClientRect
SetTimer
GetMenuState
TranslateMessage
oleacc
LresultFromObject
CreateStdAccessibleObject
kernel32
lstrlenW
WideCharToMultiByte
ReleaseMutex
LoadResource
CompareStringA
LockResource
GetPrivateProfileStringW
GetProcAddress
InterlockedExchange
FreeLibrary
FreeEnvironmentStringsA
GetLastError
FindResourceW
TerminateProcess
CreateMutexW
EnumResourceLanguagesA
lstrcmpW
CreateProcessW
GetUserDefaultUILanguage
CloseHandle
LoadLibraryW
SetCurrentDirectoryW
ExpandEnvironmentStringsW
ExitProcess
SizeofResource
GetModuleHandleW
GlobalLock
MultiByteToWideChar
WaitForSingleObject
GlobalAlloc
GetModuleFileNameW
GetLocaleInfoW
comctl32
InitCommonControlsEx
oledlg
OleUIBusyW
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ