Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
General
-
Target
file
-
Size
302KB
-
MD5
07135a44fc7c5dd32f319cc1af846727
-
SHA1
707ed617403fce8b4d1a7f6ab65abec870dce296
-
SHA256
7a1944435e8900ca716dc4b1d11f5b3924c11cd5da9c431e583c5a4d3e34f890
-
SHA512
977c0837b0ff0f7d967b1d524ec0f4b32b32baf0b1b7eabb24292f7475daa28f2cfc5c268f89b461e557ce8105476ca191b5a983b4f5f0188ee422644dc5900e
-
SSDEEP
6144:ITLJm67jBDNsD/BQ3T2l2imzgIjn8M4gTTY:II67jz4Juk+jnX4I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file
Files
-
file.exe windows x86
37146ea85ae0b616e18a34bdbcaf2cf8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
EnumCalendarInfoA
VirtualQuery
GetProfileIntW
FindResourceExW
DeleteVolumeMountPointA
ReadConsoleA
UnlockFile
SetCommBreak
GetModuleHandleW
GetTickCount
FormatMessageA
GetCompressedFileSizeW
ClearCommBreak
GetDateFormatA
TlsSetValue
GlobalAlloc
CopyFileW
GetSystemWindowsDirectoryA
GetStringTypeExW
FindNextVolumeW
ReplaceFileW
GetVolumePathNameA
GetDevicePowerState
ReleaseSemaphore
SetCurrentDirectoryA
GetLogicalDriveStringsA
OpenMutexW
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetLongPathNameA
BeginUpdateResourceW
EnumDateFormatsExA
CreateMemoryResourceNotification
LoadLibraryA
CreateHardLinkW
BeginUpdateResourceA
SetProcessWorkingSetSize
ReadConsoleInputW
GetWindowsDirectoryW
CloseHandle
CreateFileA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetupComm
CreateMutexW
GetConsoleAliasesW
SetStdHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
MultiByteToWideChar
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsFree
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
user32
SetCaretPos
CharToOemBuffA
DdeCreateStringHandleA
GetMenuBarInfo
LoadMenuA
CharUpperBuffA
DdeQueryStringA
gdi32
GetCharABCWidthsI
advapi32
InitializeAcl
winhttp
WinHttpReadData
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 19.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ