Static task
static1
Behavioral task
behavioral1
Sample
756eaf57f267e0072677397ae44dca40N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
756eaf57f267e0072677397ae44dca40N.exe
Resource
win10v2004-20240709-en
General
-
Target
756eaf57f267e0072677397ae44dca40N.exe
-
Size
60KB
-
MD5
756eaf57f267e0072677397ae44dca40
-
SHA1
b96bc777a4687576e15ff1e51451ad945019fbb4
-
SHA256
ab395a7f96204a5fc204e167c4fd9a8b2defd2037a41a79752f12983e37566f6
-
SHA512
14f4fe6c45bd52863e579da69bb51c0b0a45ea069d67a89ca7feeac2df9c27187251d434bb320db9191a931eaddcc1bc1f3fb9dfaa6066d2e8a29b916d812e58
-
SSDEEP
1536:pt3RAJeOO143LCTeqJ5UnslL2hLk14PnyjleK:j3qMOOZUns92tk1N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 756eaf57f267e0072677397ae44dca40N.exe
Files
-
756eaf57f267e0072677397ae44dca40N.exe.exe windows:4 windows x86 arch:x86
042d0fea2e92059b2a53ee91960ce9d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageA
RegisterClassExA
TranslateMessage
LoadIconA
LoadStringA
DispatchMessageA
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
SetFocus
DestroyWindow
SendMessageA
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
LoadCursorA
UpdateWindow
kernel32
ExitProcess
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetProcessHeap
lstrcpynA
LoadLibraryA
CreateDirectoryA
WriteProcessMemory
GetModuleHandleA
comctl32
ord17
wtsapi32
WTSEnumerateProcessesA
WTSLogoffSession
WTSQuerySessionInformationA
WTSWaitSystemEvent
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ