Static task
static1
Behavioral task
behavioral1
Sample
7c2178efeb46238c79a31854a2831d23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c2178efeb46238c79a31854a2831d23.exe
Resource
win10v2004-20231215-en
General
-
Target
7c2178efeb46238c79a31854a2831d23
-
Size
813KB
-
MD5
7c2178efeb46238c79a31854a2831d23
-
SHA1
600022ad2a46c61a72bee80757bcc617565b950e
-
SHA256
698ff6cd4a1032c26c99f333b98e947c56bd51167a09b7733928ce16d7318d73
-
SHA512
f116217a5455aa45f55eddff7a6d438b87a73a7b3cafa09ea1c2fe32f424b813ab3924a32fefe97c15a26f9f68fceaf41db8bd80e5bc1794c2be26b29c245fc1
-
SSDEEP
24576:iUy//pXYl9dULJbGkX+fLRZaZcwRYstZQZU8X:iV/BXdtSfftZzwRYsrQZU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c2178efeb46238c79a31854a2831d23
Files
-
7c2178efeb46238c79a31854a2831d23.exe windows:5 windows x86 arch:x86
5f5813f55ba39147766aa5f96055e9ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetConsoleTitleA
CreateMutexW
FoldStringA
LoadLibraryA
SetStdHandle
GetStringTypeA
GetTickCount
HeapCreate
GetPrivateProfileIntW
GetVolumePathNameW
lstrcpyA
GetShortPathNameW
SetCurrentDirectoryA
SetVolumeLabelA
LeaveCriticalSection
EnterCriticalSection
SetEnvironmentVariableA
GetCurrentProcess
aaclient
OpenKeyReader
g_fnStartTransport
LoadClientAdapter
OpenKeyReaderWriter
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 1024B - Virtual size: 726B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 801KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ