Static task
static1
Behavioral task
behavioral1
Sample
75e7c9639666cbef695eec75ef2f51d3.exe
Resource
win7-20231215-en
General
-
Target
75e7c9639666cbef695eec75ef2f51d3
-
Size
3.7MB
-
MD5
75e7c9639666cbef695eec75ef2f51d3
-
SHA1
124918224fab0e2d42d365f2444a39a0bca778d9
-
SHA256
15d2f23803720b08149772f72eebba254cf9d49187f12c69ddfba588b1330554
-
SHA512
9eb4b68902d633e64e51fdfa4af230586bcdcf7fe5928f10e4d9d00a2036f87ce2af1047e3a55485e3af06392131a0a26c6b57288ffc168b486c4cb40acac228
-
SSDEEP
98304:me4SjN0psxAMv+VaD/okh1apMZjZXqnP1Gj3:njoaDgkzapMKP6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75e7c9639666cbef695eec75ef2f51d3
Files
-
75e7c9639666cbef695eec75ef2f51d3.exe windows:5 windows x86 arch:x86
4bebe250350c59b1000f226573893cc8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcStringFreeW
imagehlp
ImageGetCertificateData
shlwapi
SHGetValueW
kernel32
GetCommandLineA
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CreateWindowExW
gdi32
GetStockObject
advapi32
CryptDestroyHash
shell32
SHChangeNotify
ole32
CoUninitialize
oleaut32
SysAllocString
ws2_32
bind
wldap32
ord35
mswsock
GetAcceptExSockaddrs
Sections
.text Size: - Virtual size: 782KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ