Static task
static1
Behavioral task
behavioral1
Sample
7bc6903502a04b379047bb649a5d364c.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
7bc6903502a04b379047bb649a5d364c.exe
Resource
win10v2004-20231130-en
General
-
Target
7bc6903502a04b379047bb649a5d364c.exe
-
Size
380KB
-
MD5
7bc6903502a04b379047bb649a5d364c
-
SHA1
4ee8c4a0411b938fc7a2f641905bfa3b276830d5
-
SHA256
65befbbadf131fadbdc58f2760b7135a280632d7efd214433e5b9881cd4e54d0
-
SHA512
448973da37f963f2eb7355d324d546f42f23c67886c715406f125ae5f7ed8ce08a8be8026427519685c1ef3a6c5c77e11feb9334a13115f52ddf73f352339299
-
SSDEEP
6144:5mFqTIk4P+aqUidMUOB/Vq4/7HlM8Xfz22BQO6w:m1PjqUidMUeNq4jxfzw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7bc6903502a04b379047bb649a5d364c.exe
Files
-
7bc6903502a04b379047bb649a5d364c.exe.exe windows:5 windows x86 arch:x86
64e105a717e6a1cfeca9a1f4f5c8ed00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
GetLogicalDriveStringsW
AddConsoleAliasW
GetModuleHandleW
GetTickCount
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetPriorityClass
GlobalAlloc
AddRefActCtx
GetLocaleInfoW
GetCalendarInfoW
GetModuleFileNameW
DeactivateActCtx
OpenMutexW
GetLastError
GetCurrentDirectoryW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
GetConsoleScreenBufferInfo
FindFirstVolumeMountPointW
GetNumberFormatW
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
WaitForDebugEvent
GetCurrentThreadId
GetVersionExA
OpenFileMappingA
FindNextVolumeA
ReadFile
CreateMutexW
WritePrivateProfileStructA
ReadConsoleOutputCharacterA
GetDateFormatW
GetProcessHeap
SetEndOfFile
FlushFileBuffers
WriteConsoleW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
SetStdHandle
GetConsoleOutputCP
user32
GetComboBoxInfo
CharToOemBuffW
gdi32
GetCharacterPlacementW
advapi32
GetEventLogInformation
winhttp
WinHttpCheckPlatform
msimg32
AlphaBlend
Sections
.text Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ