Static task
static1
Behavioral task
behavioral1
Sample
72b4687dd7f6e25b122c8bfd68c48110N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72b4687dd7f6e25b122c8bfd68c48110N.exe
Resource
win10v2004-20240802-en
General
-
Target
72b4687dd7f6e25b122c8bfd68c48110N
-
Size
134KB
-
MD5
72b4687dd7f6e25b122c8bfd68c48110
-
SHA1
596ad56c3ae8fefd88203ac05b68417054c6ec2a
-
SHA256
820f7c2a91da1d82ab996689430d2a0dbd689c0208d3f42ccec1eaae41b29e8d
-
SHA512
0f6ca09709bfa522254816fb0ed0f5b9bb7a8334a633b95e28a33c9708ce51ed35fdbaa920eb97ac477cc467901b5e6756270ef91bc75c7c8ab95841d8a5ff1a
-
SSDEEP
768:guDApOICMMZwk7JTafgS+jdFThUSJfieyDryyu+WBpZn:jdZFJTafg3hnfqPyyyBL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72b4687dd7f6e25b122c8bfd68c48110N
Files
-
72b4687dd7f6e25b122c8bfd68c48110N.exe windows:4 windows x86 arch:x86
2eb47895ee25649cf9e79d6e6127836a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
ShowWindow
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
MoveWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
LoadIconA
LoadCursorA
FillRect
GetDC
DialogBoxParamA
GetWindowRect
UpdateWindow
SetFocus
kernel32
GetModuleHandleA
GetCommandLineA
FindFirstFileA
GetCurrentDirectoryA
FindClose
CreateFileMappingA
FindNextFileA
DeleteFileA
CloseHandle
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
GetLastError
gdi32
CreateSolidBrush
Sections
.MPRESS1 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE