Static task
static1
Behavioral task
behavioral1
Sample
0207c7542a2707161597cffaa9e7f8a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0207c7542a2707161597cffaa9e7f8a8.exe
Resource
win10v2004-20231222-en
General
-
Target
0207c7542a2707161597cffaa9e7f8a8
-
Size
368KB
-
MD5
0207c7542a2707161597cffaa9e7f8a8
-
SHA1
81dc53b631340d6aeca60216014362dbc48823f5
-
SHA256
1654d8b65f2e59ea21af4feb62e763d7fc79e35134da9282201dfa8216c065ff
-
SHA512
ea05dd5c863922a74debc3cb790a94a955e84f4d1c631d2dba520c4992c31b21da60bc7f70abc950026c638a1d07e3a69f48812267d562e69114a02226e2ebaf
-
SSDEEP
6144:/CBhfNqgn8ov40s2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:/CBhfrnF82EB0NxDIBuOFe7/uT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0207c7542a2707161597cffaa9e7f8a8
Files
-
0207c7542a2707161597cffaa9e7f8a8.exe windows:4 windows x86 arch:x86
d2fbe91febd9f486e443981d0c804ab9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
SetEvent
lstrcpynA
GetCurrentThreadId
lstrlenW
GetTickCount
OutputDebugStringA
InterlockedIncrement
GetModuleHandleA
GetVersion
FormatMessageA
FreeLibrary
InterlockedDecrement
GetLastError
CreateMutexA
CreateEventA
OpenEventA
MultiByteToWideChar
GetModuleFileNameA
InitializeCriticalSection
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
GetCurrentProcessId
Sleep
WriteFile
SetFilePointer
CreateFileA
LoadLibraryA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
ExitProcess
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
LocalAlloc
lstrcmpA
lstrlenA
LocalFree
RaiseException
GetProcAddress
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
CharNextA
SetForegroundWindow
FindWindowA
wvsprintfA
wsprintfA
GetKeyboardType
MessageBoxA
LoadStringA
GetDesktopWindow
advapi32
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
ole32
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
OleSaveToStream
OleLoadFromStream
OleRun
CoCreateInstance
CoInitialize
CoTaskMemFree
oleaut32
GetErrorInfo
SysFreeString
SafeArrayLock
SafeArrayUnlock
SysAllocString
SysStringLen
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysAllocStringByteLen
SysStringByteLen
SafeArrayCreate
SafeArrayRedim
SafeArrayGetElement
SafeArrayPutElement
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetElemsize
LoadRegTypeLi
LoadTypeLi
VarUI4FromStr
VariantCopyInd
msvcp71
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?data@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Nomemory@std@@YAXXZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
msvcr71
??0exception@@QAE@ABV0@@Z
__security_error_handler
wcslen
_callnewh
_strdate
_strtime
_mbsrchr
atol
isdigit
realloc
memcmp
_resetstkoflw
malloc
_mbslen
sprintf
strcat
strlen
_vsnprintf
_snprintf
free
memcpy
??_V@YAXPAX@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_mbschr
_mbsnbcat
_mbsnbcpy
_mbspbrk
swprintf
__CxxFrameHandler
_CxxThrowException
memset
_except_handler3
strcpy
_purecall
??3@YAXPAX@Z
_vscprintf
vsprintf
??1type_info@@UAE@XZ
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE