Static task
static1
Behavioral task
behavioral1
Sample
a375e660fbc84f3c861efc539805938cbcf63b517908a8bb09439afb032d279e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a375e660fbc84f3c861efc539805938cbcf63b517908a8bb09439afb032d279e.exe
Resource
win10v2004-20240802-en
General
-
Target
a375e660fbc84f3c861efc539805938cbcf63b517908a8bb09439afb032d279e
-
Size
58KB
-
MD5
f340ff6777f506d39a08f66c508374a3
-
SHA1
200e21004c0e0cfa98249032dcac40bc5baac4c9
-
SHA256
a375e660fbc84f3c861efc539805938cbcf63b517908a8bb09439afb032d279e
-
SHA512
16cc5e239e6a975a03c0b25081c06582e651a545d79dbf91d1a3e1fcb24e8c1b6ac900bface0f8c2f9c1a21204ef4fc1c7e61517c670fda15abdf75cedce0654
-
SSDEEP
768:LP+PmWr1G79j19bj3pJoL4rlAlCNo25g0r7dzG4AO2O4SxCibnzMXDNhTUEjIy/y:LP+4d19bQqlBnlG4wQCYz+D/TUAm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a375e660fbc84f3c861efc539805938cbcf63b517908a8bb09439afb032d279e
Files
-
a375e660fbc84f3c861efc539805938cbcf63b517908a8bb09439afb032d279e.exe windows:4 windows x86 arch:x86
d82d14ccb74955bc5447f8c6c1bb4ac3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
GetModuleHandleA
CreateThread
GetStartupInfoA
Sleep
user32
DefWindowProcA
LoadImageA
MessageBoxA
PostQuitMessage
UnregisterClassA
ChangeDisplaySettingsA
FrameRect
GetDC
FillRect
EndPaint
BeginPaint
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
LoadCursorA
LoadIconA
RegisterClassA
gdi32
GetObjectA
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
TextOutA
SetBkColor
SetTextColor
CreateFontIndirectA
CreateRectRgn
FillRgn
Rectangle
CreateSolidBrush
ole32
CoInitialize
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
__p__commode
_exit
free
__CxxFrameHandler
memmove
memchr
getenv
__p__fmode
__set_app_type
_controlfp
_stricmp
_XcptFilter
_except_handler3
??2@YAPAXI@Z
sprintf
malloc
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ