Static task
static1
Behavioral task
behavioral1
Sample
07f321600191d83c703e6a7768797127.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07f321600191d83c703e6a7768797127.exe
Resource
win10v2004-20231215-en
General
-
Target
07f321600191d83c703e6a7768797127
-
Size
108KB
-
MD5
07f321600191d83c703e6a7768797127
-
SHA1
5a7a308ae2f7bc7257c805609492b9f2a290c1e8
-
SHA256
73ecfd0411b0e28844b6331f88be3e711c1a824d5621b1490cf2f552c21fc896
-
SHA512
87a8d738d07e986781efbc7ea0cef107f60cfac423dd6a8f0edd22f44c6c7ef84a806295b1fd235a6cc51e995ba8563ce262cb910d443d4346a691f3561d8520
-
SSDEEP
1536:sZJFJp2qacSLPnl1pvLVx5Qo7qRYuwVcB39mzhRWXAuda9Vg:sZtp3acSrnfZL5QHYuwsUhRWXPdaLg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07f321600191d83c703e6a7768797127
Files
-
07f321600191d83c703e6a7768797127.exe windows:4 windows x86 arch:x86
c70ed79ac93c75b982544825e694700e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyA
kernel32
FreeLibrary
LocalReAlloc
FreeResource
lstrcpynA
GetFileAttributesA
FormatMessageA
GlobalAddAtomA
lstrcpyA
lstrcmpiA
SetHandleCount
ExitProcess
GetProcessHeap
InitializeCriticalSection
GetDateFormatA
LockResource
GetTickCount
SetEvent
EnterCriticalSection
SizeofResource
LoadResource
LoadLibraryExA
GetFullPathNameA
MoveFileA
CreateFileA
VirtualFree
WriteFile
GetCommandLineA
GlobalFindAtomA
CreateEventA
GetLastError
LoadLibraryA
GetStdHandle
GetVersionExA
LocalAlloc
MoveFileExA
GetDiskFreeSpaceA
GetStartupInfoA
WaitForSingleObject
SetFilePointer
GetEnvironmentStrings
SetLastError
GetLocalTime
Sleep
GetVersion
VirtualAllocEx
GetProcAddress
ExitThread
GetSystemDefaultLangID
ReadFile
GetFileType
GetModuleFileNameA
GlobalAlloc
VirtualQuery
GetCPInfo
GetACP
HeapAlloc
FindClose
HeapFree
GetCurrentThread
CompareStringA
GetLocaleInfoA
GetThreadLocale
LocalFree
GetModuleHandleA
GetStringTypeA
SetErrorMode
CreateThread
lstrlenA
GetCurrentProcessId
user32
HideCaret
FillRect
SetCursor
EnumThreadWindows
BeginDeferWindowPos
FrameRect
GetSysColorBrush
DefFrameProcA
IsMenu
DeferWindowPos
GetScrollPos
DrawIcon
GetSysColor
CharLowerBuffA
EndDeferWindowPos
EnableWindow
GetClipboardData
EqualRect
MessageBoxA
GetClientRect
BeginPaint
DrawIconEx
IsDialogMessageA
CheckMenuItem
DrawFrameControl
CreateMenu
GetMenuItemInfoA
EnableScrollBar
GetDlgItem
IsWindowEnabled
GetParent
IsWindowVisible
GetCursorPos
TrackPopupMenu
DispatchMessageA
GetIconInfo
DefWindowProcA
SystemParametersInfoA
GetDesktopWindow
GetKeyNameTextA
CharLowerA
GetCursor
GetActiveWindow
GetScrollRange
CharNextA
GetDCEx
GetLastActivePopup
SetWindowLongA
CharToOemA
DefMDIChildProcA
GetCapture
DispatchMessageW
GetMenuState
GetDC
GetPropA
GetClassInfoA
EnumChildWindows
GetWindowTextA
GetClassLongA
DrawEdge
CreatePopupMenu
GetScrollInfo
CallNextHookEx
GetMenuStringA
ShowWindow
GetMenuItemID
msvcrt
memcpy
srand
calloc
memmove
log
rand
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE