Static task
static1
Behavioral task
behavioral1
Sample
7e1ac46511c5cc500d6f3aa7797d139c66100fcc016a01818c30488eb49b360b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7e1ac46511c5cc500d6f3aa7797d139c66100fcc016a01818c30488eb49b360b.exe
Resource
win10v2004-20230831-en
General
-
Target
7e1ac46511c5cc500d6f3aa7797d139c66100fcc016a01818c30488eb49b360b
-
Size
5.5MB
-
MD5
f0781f3ecbf35a93ca7cc40aacf551c8
-
SHA1
b125a95d3b510aeaba193f98294352cbbccb447f
-
SHA256
7e1ac46511c5cc500d6f3aa7797d139c66100fcc016a01818c30488eb49b360b
-
SHA512
c2c7111b1ce0937ad58f1fcb6cd538415f81499d44c5e91f27f8730012ece4e82fc3042b986c0eacd23d3fb6b536253ee0ffa5c5113bcfef59b58cad3fe1938e
-
SSDEEP
98304:Ei/GjOg88Iqeon/ipx6b/hZCGQ21E5Q1GUysIa:Ei/cOgZIdoaMnCGCfUyW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e1ac46511c5cc500d6f3aa7797d139c66100fcc016a01818c30488eb49b360b
Files
-
7e1ac46511c5cc500d6f3aa7797d139c66100fcc016a01818c30488eb49b360b.exe windows x64
7e6a2293a978227aa0ea5550cfb1d3ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateDirectoryW
GetCommandLineA
WideCharToMultiByte
SizeofResource
TerminateProcess
GetCurrentProcess
LocalAlloc
LockResource
GetShortPathNameW
LocalFree
LoadResource
FindResourceW
MultiByteToWideChar
FlushInstructionCache
CreateRemoteThread
ResumeThread
WriteProcessMemory
GetExitCodeThread
LoadLibraryA
VirtualAllocEx
WaitForSingleObject
CreateProcessW
GetNativeSystemInfo
ReadConsoleW
ReadFile
SetEndOfFile
GetStringTypeW
FlushFileBuffers
WriteConsoleW
SetStdHandle
GetLastError
HeapFree
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
RtlPcToFileHeader
RaiseException
RtlLookupFunctionEntry
RtlUnwindEx
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetProcAddress
GetStdHandle
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
HeapSize
GetConsoleCP
GetConsoleMode
CloseHandle
SetLastError
GetCurrentThreadId
GetFileType
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
OutputDebugStringW
CreateFileW
SetFilePointerEx
HeapReAlloc
LCMapStringW
FreeResource
user32
EndPaint
DestroyWindow
TranslateAcceleratorW
GetMessageW
PostQuitMessage
LoadCursorW
BeginPaint
TranslateMessage
LoadAcceleratorsW
RegisterClassExW
LoadIconW
EndDialog
LoadStringW
CreateWindowExW
DefWindowProcW
DispatchMessageW
DialogBoxParamW
shell32
SHGetPathFromIDListW
CommandLineToArgvW
SHGetSpecialFolderLocation
shlwapi
PathRemoveFileSpecW
StrCpyW
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vvv0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vvv1 Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ