Static task
static1
Behavioral task
behavioral1
Sample
07763bb04ab2b1b84453f507e70c64bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07763bb04ab2b1b84453f507e70c64bc.exe
Resource
win10v2004-20231215-en
General
-
Target
07763bb04ab2b1b84453f507e70c64bc
-
Size
125KB
-
MD5
07763bb04ab2b1b84453f507e70c64bc
-
SHA1
168fed07e383af209b1aae842786205022f9960c
-
SHA256
98bd643cb641f01e9995b04e59655e35396a8c5bbbb9bcf1d0fa73b31d729584
-
SHA512
7984a422d33a757fab1e21558ffd85568cd624518471d00e916fa0639e8eb7b9c1bac20d02e3627f7fe3f71611cc3267da1ae1d0ceaed0684dc04e577f7045c1
-
SSDEEP
3072:dTXUCNbtqZMStrgLgdpDmm0mCMyuqUeKFq:yCNb6iEpDL05UeKFq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07763bb04ab2b1b84453f507e70c64bc
Files
-
07763bb04ab2b1b84453f507e70c64bc.exe windows:4 windows x86 arch:x86
e7b60b434abf847f073a5172df160546
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateThread
ExitThread
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileAttributesA
GetFileType
GetLastError
GetLocalTime
GetModuleHandleA
GetOEMCP
GetPriorityClass
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
IsBadCodePtr
IsBadReadPtr
IsBadStringPtrA
IsBadWritePtr
LCMapStringA
LCMapStringW
LoadLibraryA
LocalAlloc
MultiByteToWideChar
OpenProcess
OutputDebugStringA
ReadFile
ReadProcessMemory
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetHandleCount
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtectEx
VirtualQuery
VirtualQueryEx
WideCharToMultiByte
WriteFile
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
user32
AppendMenuA
CallWindowProcA
CharLowerBuffA
CharUpperA
CheckDlgButton
CheckMenuItem
CheckMenuRadioItem
CheckRadioButton
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CreateDialogParamA
CreatePopupMenu
DefDlgProcA
DestroyAcceleratorTable
DestroyCursor
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EnumClipboardFormats
FindWindowA
GetActiveWindow
GetClassInfoA
GetClientRect
GetClipboardData
GetCursorPos
GetDlgItem
GetDlgItemTextA
GetMenu
GetMessageA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMenu
GetSystemMetrics
GetWindowLongA
GetWindowPlacement
GetWindowRect
GetWindowTextA
InsertMenuItemA
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
IsMenu
IsWindow
KillTimer
LoadAcceleratorsA
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
OpenClipboard
PostMessageA
PostQuitMessage
RedrawWindow
RegisterClassA
RemoveMenu
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetClipboardData
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetMenuItemInfoA
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UnregisterClassA
wsprintfA
wvsprintfA
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 108KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ