Static task
static1
Behavioral task
behavioral1
Sample
d744fe9afe7ff7a55ccc4f9703a52239.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d744fe9afe7ff7a55ccc4f9703a52239.exe
Resource
win10v2004-20240319-en
General
-
Target
d744fe9afe7ff7a55ccc4f9703a52239
-
Size
35KB
-
MD5
d744fe9afe7ff7a55ccc4f9703a52239
-
SHA1
feed834028248f0df2a8e25f29ac0be75f5d0f45
-
SHA256
28536165c641d76c757197e90bd4ec2b95e77b4e572b9a7955a403a027f7afb6
-
SHA512
5b54a2fd288fe0035668d2fd37eb6ed43b7fbf1d3b000b8448b688760291e326180808b7eb78b24b65aff109f71c90457749005f9829a92fe589a94b76ef0e6c
-
SSDEEP
768:GF2DzLDeC3iye+ZEuCSU0UR2sBYS+o2zwl1BMt:A4zGYwuCSUh2sBYSR2C1+t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d744fe9afe7ff7a55ccc4f9703a52239
Files
-
d744fe9afe7ff7a55ccc4f9703a52239.exe windows:4 windows x86 arch:x86
84b223fe1cae677af4374a780d21eb61
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetProcAddress
LoadLibraryA
VirtualProtect
user32
GetDlgItemTextW
IsClipboardFormatAvailable
LoadAcceleratorsW
SetActiveWindow
Sections
.code Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 490B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.trdata Size: - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE