Static task
static1
Behavioral task
behavioral1
Sample
7d4eec1c2528d050a6a6fabd054134933d04ff4483653144c4b26b5c0e20f80c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7d4eec1c2528d050a6a6fabd054134933d04ff4483653144c4b26b5c0e20f80c.exe
Resource
win10v2004-20230220-en
General
-
Target
7d4eec1c2528d050a6a6fabd054134933d04ff4483653144c4b26b5c0e20f80c
-
Size
136KB
-
MD5
bab0f7651599e551fe52669b11e303c0
-
SHA1
86454dbb82bb347208096e7e4c757cf5d0152c5f
-
SHA256
7d4eec1c2528d050a6a6fabd054134933d04ff4483653144c4b26b5c0e20f80c
-
SHA512
9c7561ebe468a85e0b833bde7b21fa2dd92403632a5d65f9f47edea736ee7975c38e0c2f8b503e0f4ef10e09f7c327d41e5e23fb7d8a8d67317f7cf6ca719976
-
SSDEEP
3072:scJ88aeT5JZYJO64PfvU8aemqPIGwEtseGIXdD9d37VV/Ecyu1qU6CvjyuY:su5aeT5XAO64Pp9bxE/U6CvjyV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d4eec1c2528d050a6a6fabd054134933d04ff4483653144c4b26b5c0e20f80c
Files
-
7d4eec1c2528d050a6a6fabd054134933d04ff4483653144c4b26b5c0e20f80c.exe windows x64
466b7fd58dd089c08f29c6491c918817
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateToolhelp32Snapshot
Process32NextW
LoadLibraryA
LockResource
Process32FirstW
OpenProcess
LoadResource
FindResourceW
GetProcAddress
GetCurrentProcessId
K32GetProcessImageFileNameW
GetTempPathW
HeapFree
RtlAddFunctionTable
SizeofResource
GetModuleHandleW
GetProcessHeap
ExitProcess
GetCurrentDirectoryW
HeapAlloc
GetLastError
FormatMessageW
MultiByteToWideChar
GetEnvironmentVariableW
CloseHandle
user32
EnumWindows
FindWindowW
GetClassNameW
IsHungAppWindow
UnhookWindowsHookEx
MessageBoxW
SendMessageW
SetWindowsHookExW
IsWindowVisible
GetWindowTextW
GetWindowThreadProcessId
advapi32
CryptImportKey
CryptReleaseContext
CryptDecrypt
CryptAcquireContextW
CryptDestroyKey
OpenServiceW
ChangeServiceConfigW
StartServiceW
DeleteService
OpenSCManagerW
CloseServiceHandle
CreateServiceW
shell32
ShellExecuteExW
crypt32
CryptStringToBinaryW
ntdll
NtWaitForSingleObject
NtCreateFile
NtClose
NtDeleteFile
RtlRandomEx
NtWriteFile
NtMapViewOfSection
RtlDecompressBuffer
NtCreateSection
msvcrt
free
wcschr
wcstok_s
_wcsicmp
_wcsdup
_wcstoui64
swprintf_s
memcpy
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE