Static task
static1
Behavioral task
behavioral1
Sample
e7c716a4efc1a3d8434c7978cea8fbaf24d8ec59114a9a66cda296b6bf81adcd.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
e7c716a4efc1a3d8434c7978cea8fbaf24d8ec59114a9a66cda296b6bf81adcd.exe
Resource
win10v2004-20230703-en
General
-
Target
e7c716a4efc1a3d8434c7978cea8fbaf24d8ec59114a9a66cda296b6bf81adcd
-
Size
61KB
-
MD5
dc92e18ed3d65d3f58b43ad460883b7a
-
SHA1
154e1f3e887d8df0b1fd63010faa764bd38db7fb
-
SHA256
e7c716a4efc1a3d8434c7978cea8fbaf24d8ec59114a9a66cda296b6bf81adcd
-
SHA512
9171e5153980adbbba44de1555c5c718ba61344a9698b47b6b91362667b74e7ca6ebd287f50cd7050a7a4c8453feeab45b4d917d81a787c759a7c9967a562fdf
-
SSDEEP
768:Cf2dER9VVmU0zQwRrP21FaV2yNZKm5IDiU1hX3OLg+Q:h+mxzQwRz274OzXMF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7c716a4efc1a3d8434c7978cea8fbaf24d8ec59114a9a66cda296b6bf81adcd
Files
-
e7c716a4efc1a3d8434c7978cea8fbaf24d8ec59114a9a66cda296b6bf81adcd.exe windows x86
5eafef60bddee42cc19f47375b9ab813
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
vDbgPrintExWithPrefix
kernel32
CloseHandle
DeleteCriticalSection
EnterCriticalSection
FormatMessageW
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
LocalAlloc
LocalFree
LocalReAlloc
OpenProcess
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteConsoleW
WriteFile
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_vsnprintf
_wcmdln
_wcsicmp
_wtoi
abort
bsearch
calloc
exit
fprintf
free
fwrite
iswctype
malloc
memcmp
memmove
signal
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
vfprintf
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
user32
EnumWindows
GetWindowThreadProcessId
LoadStringW
PostMessageW
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 27KB - Virtual size: 26KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ