Static task
static1
Behavioral task
behavioral1
Sample
707a748838c9989b39f997f04a56792dbea0f71b250744f5b6336cc99e628536.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
707a748838c9989b39f997f04a56792dbea0f71b250744f5b6336cc99e628536.exe
Resource
win10v2004-20240226-en
General
-
Target
707a748838c9989b39f997f04a56792dbea0f71b250744f5b6336cc99e628536
-
Size
388KB
-
MD5
13879fc638f8b0163826df8589bc32df
-
SHA1
341bc140adb389493e10e4f4fa3c8f3b343c1d51
-
SHA256
707a748838c9989b39f997f04a56792dbea0f71b250744f5b6336cc99e628536
-
SHA512
e0eaa42a34e42fa6f83f03f098e2e7c41de0ee29d09bb13a9219b32ccfb650c466944e0f399e3963e3dad40f0b421d53b084498fd3ed95d5695d25289ecd0702
-
SSDEEP
6144:UPwbaemjpfgCJsitS/WMYf7+vQnI/WPerDIdIQyW+nQFLv2GSZ2XFULpncQLf:9dUhgCJsWSeMYf7+QnRVIqIouLWQLf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 707a748838c9989b39f997f04a56792dbea0f71b250744f5b6336cc99e628536
Files
-
707a748838c9989b39f997f04a56792dbea0f71b250744f5b6336cc99e628536.exe windows:4 windows x86 arch:x86
885364cbb030db03278f62f3e0d624f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFreeNameMappings
RealShellExecuteA
ExtractAssociatedIconA
comctl32
InitCommonControlsEx
ImageList_SetDragCursorImage
ImageList_GetIconSize
ImageList_GetFlags
ImageList_GetIcon
user32
RegisterDeviceNotificationW
DeferWindowPos
MessageBoxA
SwitchToThisWindow
GetMenuItemID
AttachThreadInput
EnumDesktopsA
EnableMenuItem
GetPropA
CreateWindowExA
FrameRect
MenuItemFromPoint
AnyPopup
DrawAnimatedRects
GetClassInfoA
GetClipboardOwner
GetCursor
RegisterClassExA
LockWindowUpdate
GetClassLongW
GrayStringA
RegisterClassA
DestroyWindow
ShowWindow
SetFocus
GetWindowThreadProcessId
SetWindowPos
TrackPopupMenu
LoadKeyboardLayoutA
GetDlgItemTextA
DefWindowProcA
GetSysColor
kernel32
GetTimeFormatA
GetProcessHeap
VirtualFree
FlushFileBuffers
ReadFile
TlsSetValue
GetSystemTimeAsFileTime
GetLocaleInfoW
GetTimeZoneInformation
GetTickCount
GetProcAddress
CompareStringW
lstrlenA
DeleteFileW
LeaveCriticalSection
GetCurrentProcessId
HeapDestroy
InitializeCriticalSection
GetLastError
LoadLibraryA
SetLastError
EnumSystemLocalesA
FreeEnvironmentStringsW
GetConsoleCP
InterlockedIncrement
HeapAlloc
GetStringTypeA
TlsGetValue
CreateMutexA
SetEnvironmentVariableA
SetHandleCount
FreeLibrary
FreeEnvironmentStringsA
FlushConsoleInputBuffer
GetDiskFreeSpaceExA
WaitForMultipleObjects
WriteConsoleA
GetCurrentThreadId
InterlockedExchange
IsValidLocale
FormatMessageA
IsValidCodePage
HeapCreate
HeapReAlloc
GetDiskFreeSpaceW
GetStdHandle
GetCurrentProcess
WriteFile
GetCurrentThread
GetCommandLineA
UnhandledExceptionFilter
EnterCriticalSection
FlushInstructionCache
SetConsoleCtrlHandler
RtlUnwind
LCMapStringW
GetCommandLineW
SetComputerNameW
GetModuleFileNameW
Sleep
TlsFree
SetStdHandle
TerminateProcess
GetVersionExA
GetModuleFileNameA
IsDebuggerPresent
FillConsoleOutputCharacterW
GetUserDefaultLCID
ExpandEnvironmentStringsA
QueryPerformanceCounter
GetStringTypeW
WideCharToMultiByte
GetEnvironmentStringsW
LCMapStringA
HeapSize
SetUnhandledExceptionFilter
GetDateFormatA
LoadLibraryExW
GetACP
GetOEMCP
GlobalFree
MultiByteToWideChar
GetConsoleOutputCP
GetEnvironmentStrings
WriteConsoleW
HeapFree
CreateFileA
LocalFree
TlsAlloc
GetModuleHandleA
OpenFileMappingA
ResetEvent
SetFilePointer
ExitProcess
lstrcpyW
GetLocaleInfoA
GetStartupInfoA
InterlockedDecrement
GetCPInfo
DeleteCriticalSection
UnlockFile
VirtualProtect
GetStartupInfoW
GetConsoleMode
VirtualAlloc
VirtualQuery
CompareStringA
GetFileType
OpenMutexA
CloseHandle
comdlg32
PageSetupDlgW
PrintDlgA
GetOpenFileNameW
wininet
HttpQueryInfoW
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ