Static task
static1
Behavioral task
behavioral1
Sample
06e7f728d7d21124ea70404400ef0702.exe
Resource
win7-20231215-en
General
-
Target
06e7f728d7d21124ea70404400ef0702
-
Size
308KB
-
MD5
06e7f728d7d21124ea70404400ef0702
-
SHA1
966b3aabd4cc9f65758c36e25126be4f77d41639
-
SHA256
86369a195663c9e2f64bede5ea4942af5bc91c53ea41db180206405b83dbdaef
-
SHA512
8a01e3dbba5945c01b9af0cd6821365d3a7e3f80be2e21721a9c1f95589a3771e3699df59cd4deb0a8d619f20e2bcc4d13fc3aaa8192178f4e0c770d93278b33
-
SSDEEP
6144:Th4SJm779Z2nt2CKJUDrgc9A5ilKrGWDgLsfcrIMhg4CPbNaMyAD:6S87wtuJUvz9mikGUxMSrPZXyO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06e7f728d7d21124ea70404400ef0702
Files
-
06e7f728d7d21124ea70404400ef0702.exe windows:4 windows x86 arch:x86
0f82a01fede6478fcf75cd4657eec3b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_stricmp
strcspn
?raw_name@type_info@@QBEPBDXZ
free
calloc
_purecall
fclose
fopen
qsort
isprint
strrchr
strncpy
strchr
isdigit
_snprintf
_fullpath
strstr
toupper
_vsnprintf
vsprintf
_strnicmp
strncmp
sprintf
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
strpbrk
strspn
tolower
__CxxFrameHandler
isspace
memmove
_splitpath
strtoul
kernel32
GetCurrentDirectoryA
VirtualLock
VirtualUnlock
GetLastError
GetFileAttributesA
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
FreeLibrary
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
CreateDirectoryA
GetModuleHandleA
MoveFileA
CopyFileA
GetTempFileNameA
GetWindowsDirectoryA
SetFileTime
WriteFile
GetTickCount
SetErrorMode
Sleep
GetLocalTime
GetSystemDefaultLangID
GetTimeZoneInformation
GetVersionExA
GetDriveTypeA
GetLogicalDriveStringsA
SetLastError
SetFilePointer
SetEndOfFile
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
ExitProcess
VirtualAlloc
VirtualFree
GetSystemInfo
DeleteCriticalSection
OutputDebugStringA
InitializeCriticalSection
GetProcessHeap
HeapFree
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetExitCodeProcess
GetCurrentProcess
GetVersion
FindClose
FindFirstFileA
GetModuleFileNameA
FormatMessageA
HeapAlloc
SetThreadPriority
CreateThread
CreateEventA
WaitForSingleObject
SetEvent
UnmapViewOfFile
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceA
MapViewOfFile
CreateFileMappingA
GetVolumeInformationA
GetCurrentThread
GetComputerNameA
IsBadReadPtr
IsBadWritePtr
VirtualQuery
lstrcpynA
GetCurrentProcessId
user32
LoadStringA
IsWindow
MessageBoxA
wsprintfA
SetClassLongA
CheckDlgButton
MoveWindow
SetFocus
IsDlgButtonChecked
SendDlgItemMessageA
GetWindowRect
GetDC
ReleaseDC
GetClassInfoExA
CreateDialogParamA
UpdateWindow
DestroyWindow
DefWindowProcA
SetWindowPos
PostQuitMessage
LoadIconA
LoadCursorA
LoadImageA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
SetWindowTextA
IsWindowVisible
EnableWindow
SetTimer
GetDlgItemTextA
GetDlgItem
ShowWindow
SetDlgItemTextA
EndDialog
DialogBoxParamA
SetForegroundWindow
GetTopWindow
GetLastActivePopup
FindWindowA
gdi32
GetDeviceCaps
GetStockObject
comctl32
ord17
advapi32
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
GetUserNameA
RegCreateKeyExA
RegFlushKey
RegSetValueExA
shell32
ShellExecuteA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE