Static task
static1
Behavioral task
behavioral1
Sample
710de7aa722b240f60fc09506a8d03fe6efada27af9325a169432e63c3057427.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
710de7aa722b240f60fc09506a8d03fe6efada27af9325a169432e63c3057427.exe
Resource
win10v2004-20240226-en
General
-
Target
710de7aa722b240f60fc09506a8d03fe6efada27af9325a169432e63c3057427
-
Size
828KB
-
MD5
750377956488ceed2b45121fb9b70d42
-
SHA1
d837e5c62f80773983be198495936d8d351c0ea0
-
SHA256
710de7aa722b240f60fc09506a8d03fe6efada27af9325a169432e63c3057427
-
SHA512
231d1b377401b5c6fe7ec89ef988cbad80f902df2381eace77497ac280025c63b2f058f49467f0bdb11cc292daf3bc3796dbc7b1c8a188a1550f547c19dc1453
-
SSDEEP
24576:/NHKj32Kx4JwLLdqi2fSbObporUtLVRgD2dOunNAnJmmsGXY:/tK6KxztpObKQtLrH1nNIJmmg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 710de7aa722b240f60fc09506a8d03fe6efada27af9325a169432e63c3057427
Files
-
710de7aa722b240f60fc09506a8d03fe6efada27af9325a169432e63c3057427.exe windows:4 windows x86 arch:x86
32c5de998b5f069b26c94c8143b13c06
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
kernel32
GetModuleFileNameW
user32
GetWindow
advapi32
RegDeleteKeyA
shell32
SHGetFolderPathW
Sections
.text Size: 7KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 767KB - Virtual size: 768KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ