Static task
static1
Behavioral task
behavioral1
Sample
7a83a738db05418c0ae6795b317a45f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a83a738db05418c0ae6795b317a45f9.exe
Resource
win10v2004-20231222-en
General
-
Target
7a83a738db05418c0ae6795b317a45f9.exe
-
Size
371KB
-
MD5
7a83a738db05418c0ae6795b317a45f9
-
SHA1
bbd1c1fe4a01b698963c28a2231c33d70338014c
-
SHA256
1520e4cb2748aa5725d8b6c242ff6cf365f6672db35df2745c920ed228666317
-
SHA512
735c9762d72ae8cbce79749145d7530b89ce2be75f591af963bca225f68d80b824c33e36f7805cc778838d684cb23dc317be83b291e4bd77239085082183dad2
-
SSDEEP
6144:xgLn8r0KXqq+l8OUK06rIhRzQE+fTgYn79oUq:xggr0KXqrlhfuZP0n7a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a83a738db05418c0ae6795b317a45f9.exe
Files
-
7a83a738db05418c0ae6795b317a45f9.exe.exe windows:5 windows x86 arch:x86
41664c42ec8e82b6bc77023fb19fd70a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileExW
FreeLibrary
CreateJobObjectW
HeapFree
FreeEnvironmentStringsA
GetModuleHandleW
TlsSetValue
IsProcessInJob
WriteConsoleOutputA
SetConsoleCP
LeaveCriticalSection
DnsHostnameToComputerNameW
SetMessageWaitingIndicator
LocalHandle
GetCompressedFileSizeA
GetTimeZoneInformation
GetConsoleAliasesLengthW
SetCurrentDirectoryA
GetLastError
SetLastError
GetProcAddress
GetLongPathNameA
CreateNamedPipeA
OpenWaitableTimerA
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
VirtualLock
AddAtomA
CreateWaitableTimerW
LocalFree
SetFileAttributesW
LCMapStringW
CompareStringW
TryEnterCriticalSection
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoW
GetLocaleInfoA
WideCharToMultiByte
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
CompareStringA
SetEnvironmentVariableA
advapi32
CreateServiceA
Sections
.text Size: 222KB - Virtual size: 221KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 417B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yumub Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yodo Size: 1024B - Virtual size: 577B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ