Static task
static1
Behavioral task
behavioral1
Sample
3720ae60a968199253293ec4a326e5b455a7a6ebe820f2249f57cdbeeff87eba.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3720ae60a968199253293ec4a326e5b455a7a6ebe820f2249f57cdbeeff87eba.exe
Resource
win10v2004-20240704-en
General
-
Target
3720ae60a968199253293ec4a326e5b455a7a6ebe820f2249f57cdbeeff87eba.exe
-
Size
2.9MB
-
MD5
7e81bb9307bbedcfaf33b556e7615670
-
SHA1
9166f0252db8c29ca7f391667fd56dac144977a6
-
SHA256
3720ae60a968199253293ec4a326e5b455a7a6ebe820f2249f57cdbeeff87eba
-
SHA512
0843be91e1f095cadddec0f2167ca4ca8c40ff80f6b97b4ce88c10b22cf807cf202279e4ef574fdf79d7578ea37eba9a816f28a5726a1da332543acd7f9445b5
-
SSDEEP
49152:pD4GCpY9/GRC6ifiRhZLijxtarqe/ApOmy+bwe+CtGTlrdspvxw546KN9Kdp0:N4GCWuRCTaRhw1wHWrhd+mcl546KN9G0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3720ae60a968199253293ec4a326e5b455a7a6ebe820f2249f57cdbeeff87eba.exe
Files
-
3720ae60a968199253293ec4a326e5b455a7a6ebe820f2249f57cdbeeff87eba.exe.exe windows:4 windows x86 arch:x86
0b082736325ac4862e18c7208cc3113e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDlgItem
IsDlgButtonChecked
PostMessageA
KillTimer
SetTimer
MessageBoxW
DialogBoxParamW
DialogBoxParamA
SetWindowLongA
GetWindowLongA
GetWindowTextLengthW
GetWindowTextW
GetWindowTextLengthA
GetWindowTextA
SetWindowTextW
SetWindowTextA
SendMessageW
SendMessageA
LoadStringW
LoadStringA
CharUpperW
CharUpperA
EndDialog
oleaut32
SysFreeString
SysAllocString
VariantClear
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHBrowseForFolderA
ole32
CoUninitialize
CoInitialize
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
_except_handler3
??1type_info@@UAE@XZ
_lrotl
memset
sprintf
strlen
memcpy
free
malloc
_CxxThrowException
memmove
memcmp
_purecall
__CxxFrameHandler
kernel32
InitializeCriticalSection
GetStartupInfoA
FileTimeToLocalFileTime
Sleep
WaitForMultipleObjects
SetEvent
ResetEvent
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
CreateEventA
GetModuleHandleW
FileTimeToSystemTime
SetEndOfFile
WriteFile
SetFileTime
ReadFile
SetFilePointer
GetFileSize
CreateFileW
CreateFileA
FindFirstFileW
FindFirstFileA
FindClose
GetCurrentDirectoryW
GetCurrentDirectoryA
GetFullPathNameW
GetFullPathNameA
lstrlenA
DeleteFileW
DeleteFileA
CreateDirectoryW
CreateDirectoryA
MoveFileW
MoveFileA
RemoveDirectoryW
RemoveDirectoryA
SetFileAttributesW
SetFileAttributesA
FormatMessageW
FormatMessageA
LocalFree
GetModuleFileNameW
GetModuleFileNameA
AreFileApisANSI
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleA
GetProcAddress
VirtualFree
VirtualAlloc
WaitForSingleObject
CreateThread
DeleteCriticalSection
GetCommandLineW
GetVersionExA
CloseHandle
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ