Static task
static1
Behavioral task
behavioral1
Sample
dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531.exe
Resource
win7-20240704-en
General
-
Target
dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531.exe
-
Size
468KB
-
MD5
6c8446c6c6519fd68f7fc06306ea417d
-
SHA1
15379fdbf33bd59204d4fb40c3039c0365bc91be
-
SHA256
dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531
-
SHA512
cf111c6f13d898ca77f938824e8ec20d9d3f5f34481bb6ed7096adad0c4ed5dae21906a22748687dfcabe6241808df7408b9080f552511d7bde79fa38226be82
-
SSDEEP
6144:bc079Bvns6+dSEDVoOhjfbJ0r0dZQ4XYo8Zv/J5QnEZgHmjihGXL/578RdBg9:bV9Z1/2GOxfbQCBURzQ4ga6U8Re
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531.exe
Files
-
dfe3495d1a454c24e8c5e120e64e952e0f696478356ba5a874c1baf20c78f531.exe.exe windows:4 windows x86 arch:x86
50f8a2255c4baf188eb0098c86160f78
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
GetStartupInfoA
GetProcAddress
GetModuleHandleExA
VirtualAlloc
user32
SetDlgItemTextA
DestroyWindow
DispatchMessageA
GetDlgItemTextA
SetWindowTextA
FindWindowA
PostQuitMessage
GetSystemMenu
AppendMenuA
DefWindowProcA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
DialogBoxParamA
TranslateMessage
gdi32
GetStockObject
msvcrt
exit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
malloc
??3@YAXPAX@Z
_adjust_fdiv
_onexit
_exit
_XcptFilter
__dllonexit
_acmdln
__getmainargs
_initterm
__setusermatherr
msvcp60
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
??0Init@ios_base@std@@QAE@XZ
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
Sections
.text Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 436KB - Virtual size: 432KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ