Static task
static1
Behavioral task
behavioral1
Sample
73a7e6ab2b33a97651db26756196e9d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73a7e6ab2b33a97651db26756196e9d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
73a7e6ab2b33a97651db26756196e9d0N
-
Size
134KB
-
MD5
73a7e6ab2b33a97651db26756196e9d0
-
SHA1
08a9fa78a8337f57aa1eea82f1dbd7db061d592f
-
SHA256
ebf8e44441341e20240a7a243c2514c76aca069cda6f44abb64c768ec42d3338
-
SHA512
3d99179c92753df93084f35b560ee402d33ab2adbe15874c3ee254efdf261ded29e7f77c0d7aeb9184f81b5680d66f5a238c2f267a658ebcb5c95ac888bdd78a
-
SSDEEP
768:guDApOICMMZwk7JTafgS+jdFThUSJfieyDryyu+WBpZZJ:jdZFJTafg3hnfqPyyyB1J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73a7e6ab2b33a97651db26756196e9d0N
Files
-
73a7e6ab2b33a97651db26756196e9d0N.exe windows:4 windows x86 arch:x86
2eb47895ee25649cf9e79d6e6127836a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
ShowWindow
PostQuitMessage
GetMessageA
DispatchMessageA
TranslateMessage
MoveWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
SendMessageA
LoadIconA
LoadCursorA
FillRect
GetDC
DialogBoxParamA
GetWindowRect
UpdateWindow
SetFocus
kernel32
GetModuleHandleA
GetCommandLineA
FindFirstFileA
GetCurrentDirectoryA
FindClose
CreateFileMappingA
FindNextFileA
DeleteFileA
CloseHandle
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
GetLastError
gdi32
CreateSolidBrush
Sections
.MPRESS1 Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE