Static task
static1
Behavioral task
behavioral1
Sample
7da12be127d0e15aacfa843fd26cebae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7da12be127d0e15aacfa843fd26cebae.exe
Resource
win10v2004-20231222-en
General
-
Target
7da12be127d0e15aacfa843fd26cebae
-
Size
614KB
-
MD5
7da12be127d0e15aacfa843fd26cebae
-
SHA1
5cad9ed8ec0cd84590e0003a41c0ad81e057e32c
-
SHA256
c6ec601254830a854173ed7a0386fb842fb741920a7f2f6cd0d91a4d76cbb6ff
-
SHA512
2883101f6a8a8bfc1b04531482e76c1594f3d3ed9d6473753556d4fefc5be6ac96d6b556452bab616e86d1063dda50d6d8016bdb88b5636cc5b33933a67c5896
-
SSDEEP
12288:zfqFA31Int+NFd5BplNancP0enKqePHTE4XDlhrhzxtM4OIeV:z6AR5BZepPjxpfQI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7da12be127d0e15aacfa843fd26cebae
Files
-
7da12be127d0e15aacfa843fd26cebae.exe windows:4 windows x86 arch:x86
88d77eb3bf3f20cc7b7c05b0f93a3d9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatA
FreeLibrary
IsValidCodePage
EnumSystemLocalesA
RtlUnwind
GetTimeFormatA
EnterCriticalSection
GetCurrentProcess
GetStartupInfoA
VirtualAlloc
LCMapStringW
IsBadReadPtr
HeapReAlloc
GetModuleFileNameW
SetConsoleTitleW
GetLocaleInfoW
GetConsoleMode
WideCharToMultiByte
GetModuleFileNameA
GetCurrentThread
lstrlenA
VirtualFree
GetFileType
GetStringTypeA
TlsSetValue
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetStartupInfoW
GetConsoleCP
HeapValidate
QueryPerformanceCounter
SetHandleCount
OutputDebugStringA
WriteConsoleA
MultiByteToWideChar
SetEnvironmentVariableA
GetCommandLineW
HeapAlloc
GetOEMCP
HeapFree
ContinueDebugEvent
TlsFree
GetCurrentProcessId
DeleteCriticalSection
GetTimeZoneInformation
TlsGetValue
RaiseException
HeapSize
GetCPInfo
GetLastError
GetUserDefaultLCID
GetConsoleOutputCP
SetUnhandledExceptionFilter
OutputDebugStringW
CloseHandle
FlushFileBuffers
TlsAlloc
Sleep
SetStdHandle
DebugBreak
UnmapViewOfFile
LoadLibraryW
UnhandledExceptionFilter
CompareStringA
GetACP
HeapDestroy
GetProcAddress
GetLocaleInfoA
GetModuleHandleW
FreeEnvironmentStringsW
IsDebuggerPresent
InterlockedExchange
WriteConsoleW
SetLastError
GetProcessHeap
VirtualQuery
SetFilePointer
SetConsoleCtrlHandler
EnumResourceLanguagesA
IsValidLocale
GetCurrentThreadId
InterlockedDecrement
ConnectNamedPipe
TerminateProcess
GetEnvironmentStringsW
InterlockedIncrement
WriteProfileSectionA
WriteFile
LeaveCriticalSection
GetStdHandle
HeapCreate
CompareStringW
ExitProcess
LCMapStringA
CreateFileA
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeW
wininet
FtpRenameFileW
InternetGoOnline
FtpRemoveDirectoryA
InternetCreateUrlA
InternetConfirmZoneCrossing
RetrieveUrlCacheEntryFileA
InternetTimeToSystemTimeA
FindNextUrlCacheEntryExA
GopherCreateLocatorW
InternetHangUp
HttpCheckDavCompliance
SetUrlCacheEntryGroupA
FtpRemoveDirectoryW
InternetWriteFile
IsUrlCacheEntryExpiredW
GetUrlCacheHeaderData
UpdateUrlCacheContentPath
GopherFindFirstFileA
InternetReadFileExW
InternetOpenA
IsUrlCacheEntryExpiredA
ReadUrlCacheEntryStream
shell32
SHBrowseForFolder
DragAcceptFiles
SHGetDataFromIDListW
SHGetSpecialFolderPathW
ShellExecuteEx
DragQueryPoint
SHQueryRecycleBinW
SHFormatDrive
ShellExecuteExW
CommandLineToArgvW
SHUpdateRecycleBinIcon
SHAppBarMessage
SHGetSpecialFolderLocation
DoEnvironmentSubstW
FreeIconList
ExtractAssociatedIconW
ShellExecuteW
SHFileOperation
ExtractAssociatedIconExA
ShellHookProc
Sections
.text Size: 251KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 349KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ