Static task
static1
Behavioral task
behavioral1
Sample
3f34193789bbc93f788f62faf08463f43dc0d59df0594dbe18891d09bd43b809.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f34193789bbc93f788f62faf08463f43dc0d59df0594dbe18891d09bd43b809.exe
Resource
win10v2004-20240709-en
General
-
Target
3f34193789bbc93f788f62faf08463f43dc0d59df0594dbe18891d09bd43b809
-
Size
58KB
-
MD5
4ff22e13d23cb183875c9bb62c9d7478
-
SHA1
0db3d8804497c7c8bdc865be64ec26ed82ed98f9
-
SHA256
3f34193789bbc93f788f62faf08463f43dc0d59df0594dbe18891d09bd43b809
-
SHA512
deb57cf59495e313e170cc9c13d0b8211dcc6cf05edaa90ad90bf9a1705b6ee8e38d2911526aa9abb8ad9bd7af88e412711069bc19260bfcc36d0f89b29e5946
-
SSDEEP
768:vDqYnMTOV5ZXO9o56McUyc8fHAl4MbPA9ScVOuuGMp0scvgi6:AOjXO2MMcUyc2XM89JuGrvi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3f34193789bbc93f788f62faf08463f43dc0d59df0594dbe18891d09bd43b809
Files
-
3f34193789bbc93f788f62faf08463f43dc0d59df0594dbe18891d09bd43b809.exe windows:5 windows x86 arch:x86
5038cc1d7d4ba6ce1ebcfec67b707138
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
VirtualFree
IsBadReadPtr
LoadLibraryA
SetLastError
ExitProcess
FreeLibrary
GetModuleHandleA
user32
MessageBoxIndirectA
SendMessageA
DialogBoxParamA
GetDlgItem
EndDialog
LoadIconA
comctl32
InitCommonControlsEx
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 510B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ