Static task
static1
Behavioral task
behavioral1
Sample
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe
Resource
win10v2004-20240802-en
General
-
Target
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4
-
Size
204KB
-
MD5
fec01093a986eca421cf16fe305b8fdc
-
SHA1
aeebb8899aa298bf8a949369f0fe122223a83149
-
SHA256
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4
-
SHA512
066fb3ed08b16aa01f0a21ad2661c1ce7cda7c3eb817037a4fbf9be068224d37157406ee9336d2c83ca3e01830d8d6553b893cf7353c32836fc53dda578b7b9b
-
SSDEEP
3072:Q5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:QLexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4
Files
-
74f585ada49b89c894a0a2208ab7a97d6b331fe04ce2fbfd2d69bd81f27f26f4.exe windows:4 windows x86 arch:x86
add9e90fe8cc1a6d600a60e22be53bf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
lstrcat
CompareFileTime
SetEvent
GetTempPathA
CopyFileExA
GlobalDeleteAtom
CopyFileA
LocalFree
CopyFileExW
ExitProcess
ExpandEnvironmentStringsA
LoadLibraryA
GetLogicalDriveStringsW
GetCommandLineA
IsValidLocale
SetPriorityClass
GetThreadPriority
GetWindowsDirectoryW
GetTempFileNameA
GetDateFormatA
SetThreadPriority
EnumCalendarInfoW
GetNumberFormatW
MultiByteToWideChar
OpenMutexW
GetFileAttributesW
GetSystemDefaultLCID
ExpandEnvironmentStringsW
GetProcAddress
GetLogicalDriveStringsA
lstrcpynW
GetLogicalDrives
GetCurrentDirectoryA
IsBadReadPtr
GetStringTypeA
user32
SetFocus
RegisterClassExW
SetTimer
CharLowerA
ShowWindow
MessageBoxW
CopyImage
LoadImageA
GetClassLongA
RegisterClassExA
PostMessageW
SetParent
GetDlgItemTextA
DefWindowProcA
GetClientRect
SendMessageW
DefFrameProcA
EnumDesktopsA
SetForegroundWindow
InvalidateRect
CheckDlgButton
LoadMenuIndirectA
GetWindowTextLengthA
SetWindowTextW
GetDC
LoadBitmapA
SendDlgItemMessageA
DefWindowProcW
SetDlgItemTextA
SendDlgItemMessageW
ChildWindowFromPoint
DestroyIcon
ArrangeIconicWindows
DrawTextA
CreateDialogIndirectParamA
DefDlgProcW
CharUpperA
CharPrevW
GetScrollPos
UpdateLayeredWindow
CallWindowProcA
GetDC
SetWindowRgn
gdi32
CreateRoundRectRgn
ResetDCW
Arc
CreatePen
CreateColorSpaceW
GetTextExtentPointA
GetPath
OffsetClipRgn
RectInRegion
advapi32
RegRestoreKeyW
RegDeleteKeyA
RegSaveKeyA
RegReplaceKeyW
RegReplaceKeyA
RegOpenKeyExA
RegFlushKey
shell32
SHCreateDirectoryExW
ShellExecuteExW
ExtractAssociatedIconExW
DuplicateIcon
SHGetDataFromIDListA
StrChrA
SHGetFileInfoA
StrChrIW
ExtractAssociatedIconA
shlwapi
UrlCombineA
PathMakeSystemFolderA
UrlUnescapeW
SHRegSetUSValueA
SHCreateThread
PathAppendA
PathCombineW
PathIsLFNFileSpecA
PathSetDlgItemPathW
StrToInt64ExA
SHCreateStreamOnFileW
StrCSpnIW
ColorRGBToHLS
SHRegGetBoolUSValueW
oleaut32
VarUI4FromUI1
VarIdiv
VarCyFromUI1
VarDateFromUI2
VarI8FromI2
VarR4CmpR8
VarNumFromParseNum
opengl32
glGetTexImage
glRectsv
crypt32
CryptSIPPutSignedDataMsg
CryptEnumKeyIdentifierProperties
Sections
.pGCC Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.XJy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.TvKn Size: 3KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CA Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 117KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ylLMGt Size: 512B - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Z Size: 1KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 758B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ