Static task
static1
Behavioral task
behavioral1
Sample
7e641051d89eb429eb34611e00fba9a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e641051d89eb429eb34611e00fba9a9.exe
Resource
win10v2004-20231215-en
General
-
Target
7e641051d89eb429eb34611e00fba9a9
-
Size
75KB
-
MD5
7e641051d89eb429eb34611e00fba9a9
-
SHA1
dc32d96007f53fc5d218866a03be3c51011540e7
-
SHA256
dc343489ce333e6582878048cc9777c7553b2397876e1c33e9af982caa1e660e
-
SHA512
f8be902facd23ff48124251f47094d53fb4129a1762a9997e8ff340a1dab791ea13dff25baa35b55327e63e0e754da824bd6f70bcdaa669f16ca5438817a8c31
-
SSDEEP
768:bwJwdZ/GWA+7lbOgZeGa2G13JS2gzEevqpibYIpFtpa47DnDI0Hprx32G9Ozy:UA/v7guh+36zDjpFna4j/5xd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e641051d89eb429eb34611e00fba9a9
Files
-
7e641051d89eb429eb34611e00fba9a9.exe windows:4 windows x86 arch:x86
98f1b684a75ca4a48627d7fd5a9ec84b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PurgeComm
OutputDebugStringA
VirtualQuery
GetTickCount
GetPrivateProfileStringA
CreateMutexW
DosDateTimeToFileTime
SetTimeZoneInformation
CreateMutexA
SetThreadPriorityBoost
FlushFileBuffers
GetLongPathNameA
FindNextChangeNotification
SetEndOfFile
QueryDosDeviceA
FreeLibrary
SetLastError
lstrcpynA
FileTimeToLocalFileTime
EnumResourceLanguagesW
EnumCalendarInfoA
SetThreadAffinityMask
GetComputerNameW
SystemTimeToFileTime
ExpandEnvironmentStringsW
GlobalFindAtomA
MoveFileExA
CreateProcessA
MultiByteToWideChar
RaiseException
CancelIo
LCMapStringA
CreateIoCompletionPort
WritePrivateProfileStructA
OpenFile
GetOEMCP
AreFileApisANSI
GetTimeZoneInformation
GetCommModemStatus
_lopen
OpenSemaphoreW
SearchPathW
GlobalDeleteAtom
ReadFileScatter
VirtualUnlock
UnmapViewOfFile
GetProcessTimes
GetAtomNameA
CreateEventA
ReleaseMutex
SetProcessAffinityMask
VirtualAllocEx
GetOverlappedResult
SetNamedPipeHandleState
LocalReAlloc
LoadLibraryExA
GetSystemDirectoryW
GetFileAttributesExA
lstrcmpA
InitializeCriticalSection
WritePrivateProfileStringA
SetProcessWorkingSetSize
FlushConsoleInputBuffer
SetupComm
GetDiskFreeSpaceW
GetHandleInformation
ReadFile
WriteConsoleOutputCharacterA
GetBinaryTypeW
IsBadStringPtrA
GlobalFlags
TryEnterCriticalSection
GetACP
VirtualQueryEx
GetPrivateProfileSectionW
WritePrivateProfileSectionA
SetConsoleMode
IsValidLocale
GetShortPathNameW
GetThreadPriority
FindFirstFileW
GetSystemTimeAsFileTime
GetShortPathNameA
GetUserDefaultLCID
EnumCalendarInfoW
GetTempFileNameA
GetCommandLineA
VirtualAlloc
GetCompressedFileSizeW
ExitProcess
user32
ExitWindowsEx
GetScrollPos
GetSysColor
ShowWindowAsync
ShowOwnedPopups
LoadMenuIndirectW
SetWindowWord
CheckMenuItem
OemToCharA
CreateDialogIndirectParamA
UnregisterHotKey
SetWindowContextHelpId
ExcludeUpdateRgn
GetForegroundWindow
CharPrevA
PostThreadMessageA
ToUnicode
GetWindow
RemovePropA
SetProcessWindowStation
LoadBitmapA
LoadStringW
FlashWindow
CreatePopupMenu
GetTitleBarInfo
GetCursorPos
InvertRect
GetAncestor
VkKeyScanW
DestroyMenu
IsCharUpperW
GetPropW
GetKeyboardType
CharToOemBuffA
BeginDeferWindowPos
GetWindowTextW
SetThreadDesktop
UnregisterClassA
IsZoomed
EnumDisplaySettingsW
GetNextDlgGroupItem
CharNextW
CharUpperBuffA
MenuItemFromPoint
GrayStringW
CheckMenuRadioItem
DrawFocusRect
GetMenuItemCount
UnionRect
SetClassLongA
ModifyMenuW
GetInputState
DrawAnimatedRects
ChangeDisplaySettingsW
BringWindowToTop
LoadAcceleratorsW
GetUpdateRgn
PostThreadMessageW
EqualRect
GetClipboardSequenceNumber
SetUserObjectInformationW
InvalidateRgn
gdi32
GetCharWidth32W
GetRegionData
ResizePalette
SetViewportOrgEx
CreateDIBSection
RemoveFontResourceW
Polyline
TextOutA
GetTextFaceW
EnumFontFamiliesW
SaveDC
CreateEllipticRgn
SetDIBColorTable
GetBrushOrgEx
StretchBlt
GetFontLanguageInfo
EnumFontFamiliesExA
PlayMetaFile
CopyMetaFileW
CreatePolygonRgn
comdlg32
ChooseFontA
ChooseFontW
advapi32
GetExplicitEntriesFromAclW
CryptGetProvParam
BuildTrusteeWithSidW
DeleteAce
InitiateSystemShutdownA
GetSecurityDescriptorGroup
OpenProcessToken
CopySid
CryptReleaseContext
AddAccessDeniedAce
GetSecurityDescriptorOwner
CryptSetKeyParam
GetTokenInformation
LookupAccountSidW
SetServiceStatus
ImpersonateLoggedOnUser
CryptGenRandom
ObjectCloseAuditAlarmA
EnumServicesStatusW
SetFileSecurityW
AllocateLocallyUniqueId
CryptGenKey
SetSecurityDescriptorOwner
InitializeAcl
ObjectDeleteAuditAlarmW
LookupPrivilegeValueA
AddAce
ReportEventW
RegQueryValueW
GetSecurityDescriptorControl
RegEnumValueA
RegUnLoadKeyA
RegEnumKeyExA
shell32
SHGetSettings
DragFinish
SHGetSpecialFolderLocation
SHLoadInProc
DragAcceptFiles
SHGetPathFromIDListA
ole32
StgSetTimes
oleaut32
LoadTypeLi
QueryPathOfRegTypeLi
SafeArrayGetLBound
VariantChangeType
LoadTypeLibEx
shlwapi
PathIsRootA
StrTrimA
StrChrW
StrDupA
StrRStrIW
PathUndecorateW
StrCmpIW
SHSetThreadRef
StrFormatKBSizeW
PathCompactPathW
SHCopyKeyW
SHAutoComplete
UrlGetPartA
StrFormatByteSizeW
PathFindNextComponentW
PathCanonicalizeW
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE