Static task
static1
Behavioral task
behavioral1
Sample
07ea3786203fe7875683d9e225529c9a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07ea3786203fe7875683d9e225529c9a.exe
Resource
win10v2004-20231215-en
General
-
Target
07ea3786203fe7875683d9e225529c9a
-
Size
109KB
-
MD5
07ea3786203fe7875683d9e225529c9a
-
SHA1
7a2a79a56b91d929380f3e198440bba98e5f67b4
-
SHA256
d47e6b50a806ab1c908c7a79b995f51adfbefd4e04eea9a05ecfea46d07426f2
-
SHA512
8a9b1d8a1d2cf5169453b67a7e5496f8d519a99ae578b412f1203cad990ece995dd1af50dc9b90962884a6587b76dc2ac3fec3eda0efa85ff98c3f08ee65996c
-
SSDEEP
3072:Mf2sgVxzgtYMgkwnmJQcY5vA0RDq3F3gJyiNXIv:Mf2D8zK0fYlATF3g8GX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07ea3786203fe7875683d9e225529c9a
Files
-
07ea3786203fe7875683d9e225529c9a.exe windows:4 windows x86 arch:x86
5b742b4a12037dfcea79b0a837cd7ab3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
advapi32
RegEnumValueA
RegDeleteValueA
user32
LoadStringA
SendMessageA
MessageBoxA
OpenClipboard
PeekMessageW
RegisterClipboardFormatA
PostQuitMessage
SetActiveWindow
PeekMessageA
RemovePropA
RedrawWindow
ReleaseCapture
MapWindowPoints
RemoveMenu
LoadIconA
RegisterWindowMessageA
PostMessageA
PtInRect
MapVirtualKeyA
OemToCharA
OffsetRect
SendMessageW
LoadCursorA
ScrollWindow
LoadBitmapA
ReleaseDC
LoadKeyboardLayoutA
ScreenToClient
MessageBeep
RegisterClassA
gdi32
SetBkColor
GetObjectA
SetBkMode
SetTextColor
SaveDC
SelectPalette
CreateDIBitmap
GetDCOrgEx
CreatePenIndirect
RestoreDC
kernel32
LoadLibraryExA
GlobalDeleteAtom
GetDiskFreeSpaceA
SetEndOfFile
GetCurrentThreadId
FindResourceA
GetFullPathNameA
LoadLibraryA
GetProcessHeap
GetModuleHandleA
WideCharToMultiByte
ResetEvent
GetModuleHandleW
LockResource
lstrcmpA
lstrlenA
GetVersionExA
ExitProcess
SetErrorMode
lstrcatA
GetLocaleInfoA
ReadFile
GetStringTypeW
GlobalFindAtomA
GetACP
Sleep
EnumCalendarInfoA
IsBadHugeReadPtr
FindClose
GetUserDefaultLCID
GetCommandLineA
GetModuleFileNameA
SetEvent
lstrlenW
GetFileType
GetFileSize
MulDiv
GetLastError
GetDateFormatA
lstrcpyA
HeapAlloc
RaiseException
GetProcAddress
GetCPInfo
CloseHandle
ExitThread
GetSystemDefaultLangID
LocalAlloc
SetThreadLocale
CreateEventA
SetFilePointer
SizeofResource
DeleteFileA
GetCurrentProcessId
lstrcmpiA
IsBadReadPtr
GetCommandLineW
HeapDestroy
GlobalAddAtomA
VirtualAllocEx
WriteFile
msvcrt
cos
clock
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 1024B - Virtual size: 883B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 512B - Virtual size: 306B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ