Static task
static1
Behavioral task
behavioral1
Sample
7ae1ab58e205a76caccb146aa6ccc624.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ae1ab58e205a76caccb146aa6ccc624.exe
Resource
win10v2004-20231215-en
General
-
Target
7ae1ab58e205a76caccb146aa6ccc624
-
Size
165KB
-
MD5
7ae1ab58e205a76caccb146aa6ccc624
-
SHA1
fb423d4f814bc707474e87777b9c363abfd42e48
-
SHA256
e6cb15a8c5fd234cc84ddc7ef11ad8e30ddbc6716a11d43474fad231f7261370
-
SHA512
2640d859c03bf924af2ecac6613a8be4d684de26674bbd86f408cd7b40ec31a9eec69a0c33f4e28b064a96998344aad0f7d4e269c193a6567d125df91b2e8aed
-
SSDEEP
3072:CKyZrv6M9DIPeHy8U1A6knaUfyZqCnYWO3iGN1O:yrSuNn3qM1WO3O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ae1ab58e205a76caccb146aa6ccc624
Files
-
7ae1ab58e205a76caccb146aa6ccc624.exe windows:5 windows x86 arch:x86
122ac166d40bc57e1b305220b734616e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
GetParent
GetDesktopWindow
TranslateMessage
CharNextA
GetDC
kernel32
DeleteFileW
GetOEMCP
GetACP
GetWindowsDirectoryA
GetThreadLocale
GlobalFindAtomA
GetCurrentThreadId
GetCurrentProcess
GetDriveTypeA
GetConsoleOutputCP
GetCurrentProcessId
RemoveDirectoryA
GetVersion
lstrcmpA
SetCurrentDirectoryA
lstrlenW
GetProcessHeap
CopyFileA
GetCurrentThread
GetModuleHandleA
IsDebuggerPresent
GetStartupInfoA
GetUserDefaultLangID
GetCommandLineW
lstrcmpiW
MulDiv
lstrlenA
GetModuleHandleW
VirtualAlloc
VirtualFree
GlobalFindAtomW
lstrcmpiA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
gdi32
SaveDC
CreateSolidBrush
GetDeviceCaps
GetClipBox
GetStockObject
SelectPalette
CreateFontIndirectA
SetMapMode
LineTo
CreatePalette
SelectObject
RestoreDC
SetStretchBltMode
DeleteObject
GetTextMetricsA
SetTextColor
GetPixel
DeleteDC
PatBlt
SetTextAlign
GetObjectA
CreateCompatibleDC
RectVisible
CreatePen
glu32
gluNurbsCallback
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Xasgwtda Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Tlftbaoo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ