Static task
static1
Behavioral task
behavioral1
Sample
d73cf1fc812987849a28ab32e73c94b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d73cf1fc812987849a28ab32e73c94b2.exe
Resource
win10v2004-20231215-en
General
-
Target
d73cf1fc812987849a28ab32e73c94b2
-
Size
123KB
-
MD5
d73cf1fc812987849a28ab32e73c94b2
-
SHA1
79147cd8ed12f41ea231ed86d908941e39c7c5bc
-
SHA256
ec356f3faae95d232183957bfe506433ea27de0438e328b6bfa7ac9ef388f525
-
SHA512
19876f41c9849c7437e8b82c182cbb85a1049e86b572b41286efc6b1d7d3f395c62658ae8d4a64f4784659d623ccbd7a213596520b22f4e05f342790856be3de
-
SSDEEP
3072:9vMW4NZ+ZcAXEUOlp/W/u3Pb2gBeExZ1:VMW4CZz/ufb2gck3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d73cf1fc812987849a28ab32e73c94b2
Files
-
d73cf1fc812987849a28ab32e73c94b2.exe windows:5 windows x86 arch:x86
37cf17d7bf6bf48595f738d796632132
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
wjxhook
InjectDll
user32
LoadCursorW
gdi32
DeleteObject
winspool.drv
OpenPrinterW
advapi32
LookupPrivilegeValueW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameW
oleaut32
VariantClear
iphlpapi
GetAdaptersInfo
Sections
.text Size: 113KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE