Static task
static1
Behavioral task
behavioral1
Sample
34795fbe14aabdc3c24f0bd2f907ae8edead70e65eb106876a3c62f92177f0d1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34795fbe14aabdc3c24f0bd2f907ae8edead70e65eb106876a3c62f92177f0d1.exe
Resource
win10v2004-20240412-en
General
-
Target
34795fbe14aabdc3c24f0bd2f907ae8edead70e65eb106876a3c62f92177f0d1
-
Size
23KB
-
MD5
04de54fd4906cfd51290ca11f5b77b42
-
SHA1
caeea40b9307ead78d9fd24c5918eaa0a43d8343
-
SHA256
34795fbe14aabdc3c24f0bd2f907ae8edead70e65eb106876a3c62f92177f0d1
-
SHA512
e7b1615e86c0a3de7500a85b7b04dccb3cbb3ee5b5298dd7680b86a2f01a428b999526a09cfc90110eb727dcf5a992a45a2a6bd8047d896392a89cb220c91c36
-
SSDEEP
384:9cd6w+NomiUBQZVoRiCKKtYh2pNvdAajICCKm7QUaVbs6hCmHmycX12oGU3Ute01:qIomvQ7oTOUVAaMiiAAmHAX12oGMi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34795fbe14aabdc3c24f0bd2f907ae8edead70e65eb106876a3c62f92177f0d1
Files
-
34795fbe14aabdc3c24f0bd2f907ae8edead70e65eb106876a3c62f92177f0d1.exe windows:4 windows x86 arch:x86
d212f4856ef91a73d17f9e9cdf7752bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
PostQuitMessage
DefWindowProcW
SendMessageW
LoadIconW
LoadCursorW
DispatchMessageW
GetMessageW
CreateWindowExW
RegisterClassExW
ClientToScreen
CloseClipboard
PostMessageW
CharLowerW
UpdateWindow
ChangeClipboardChain
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetModuleHandleW
HeapAlloc
GetProcessHeap
lstrcatW
HeapFree
lstrcpyW
GetCommandLineA
comctl32
ImageList_Create
ord17
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ