Static task
static1
Behavioral task
behavioral1
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Resource
win10v2004-20231023-en
General
-
Target
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
-
Size
894KB
-
MD5
ec8fef72a73ff94440235fc1b3f3f690
-
SHA1
e651cd12a2493b9c2d7ebd8287a2fd29b8f4cd9c
-
SHA256
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c
-
SHA512
b62f2f518f4ed3d74d96551a8c7431d50bd3349221b4b01dded18a270cbdbd1441f13f3eef7a6cc0db4aad200f1cf2babeb8e937edf8827faa7a03e4b59a35f2
-
SSDEEP
12288:d31hZus7pQqiiyuuFuawu2zhjWBv4+1FMUUfW75CXQKXTZ1VG:1r1S+NjWx4+1SWV6Q4n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe
Files
-
7d98972d5c78e1d4969da76856d6818942b606c267efa67fd31d39ae77497e9c.exe.exe windows:6 windows x86 arch:x86
d999d23008cd11044758e92d9fe0a834
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
CreateMutexA
GetCurrentProcessId
ExitProcess
TerminateProcess
OpenProcess
GetModuleFileNameA
Sleep
CopyFileA
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateThread
CreateFileW
GetConsoleCP
GetFullPathNameW
GetFileAttributesA
FindNextFileW
FindFirstFileExW
FindClose
MoveFileA
lstrcmpiA
CloseHandle
WriteFile
SetFilePointerEx
SetEndOfFile
ReadFile
GetFileSizeEx
OpenMutexA
CreateFileA
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetLastError
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
FreeLibrary
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleFileNameW
LoadLibraryExW
EncodePointer
GetModuleHandleExW
HeapValidate
GetSystemInfo
GetStdHandle
GetACP
GetStringTypeW
GetCurrentThread
GetFileType
OutputDebugStringA
OutputDebugStringW
WriteConsoleW
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
HeapReAlloc
HeapQueryInformation
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
DecodePointer
user32
wsprintfA
advapi32
CryptEncrypt
CryptImportKey
CryptExportKey
CryptSetKeyParam
CryptDestroyKey
CryptGenKey
CryptAcquireContextA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
CryptDecrypt
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
Sections
.text Size: 702KB - Virtual size: 701KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ