Static task
static1
Behavioral task
behavioral1
Sample
007b16f4d009635f3b889d94abfe2f37.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
007b16f4d009635f3b889d94abfe2f37.exe
Resource
win10v2004-20231215-en
General
-
Target
007b16f4d009635f3b889d94abfe2f37
-
Size
29KB
-
MD5
007b16f4d009635f3b889d94abfe2f37
-
SHA1
e1b709360656e0d7186340a44f5bfbf4ecd28f7e
-
SHA256
e174dac79f54f8b2bd6de1468a88b12dce231c28709af6540634087eae022dc7
-
SHA512
bc4ad0ab3c7010674d6a96d18144de459c362e8238cef1d2dd5ce73e351451efd414bf39445054438978d857fde68ab123ca7d30c421c85087552049557e888f
-
SSDEEP
384:a02egeszkcKv8ohyBConR4gxH5OCg1eAXm+9xDH/+rLS0pCmVH1:zsrohyrnegnOJeAW+fD/qLS0A0H1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 007b16f4d009635f3b889d94abfe2f37
Files
-
007b16f4d009635f3b889d94abfe2f37.exe windows:4 windows x86 arch:x86
6bd32a3acdb7646039ca92216b17bbb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
ExitProcess
lstrcpyA
RemoveDirectoryA
VirtualFree
CloseHandle
lstrcmpA
VirtualAlloc
CompareStringA
WritePrivateProfileStringA
FindNextFileA
GetCurrentDirectoryA
GetFullPathNameA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
MoveFileExA
CopyFileA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
SetFilePointer
GetFileSize
CreateFileA
GetTempPathA
GetWindowsDirectoryA
GetModuleFileNameA
InterlockedIncrement
FindFirstFileA
SetCurrentDirectoryA
lstrcpynA
lstrcatA
DeleteFileA
SetFileAttributesA
SetStdHandle
GetLastError
HeapAlloc
GetStringTypeW
GetStringTypeA
FlushFileBuffers
lstrlenA
GetModuleHandleA
HeapFree
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetVersion
GetCommandLineA
UnhandledExceptionFilter
GetStartupInfoA
RtlUnwind
user32
DdeUninitialize
DdeInitializeA
SendDlgItemMessageA
DdeDisconnect
DdeFreeStringHandle
DdeFreeDataHandle
DialogBoxParamA
FindWindowA
EndDialog
ShowWindow
GetWindowLongA
LoadIconA
SetClassLongA
SetWindowTextA
GetWindowRect
SetWindowPos
SetDlgItemTextA
PostMessageA
GetDlgItem
DdeCreateDataHandle
DdeCreateStringHandleA
DdeConnect
wsprintfA
DdeClientTransaction
MessageBoxA
CharLowerA
EnableWindow
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 113B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ