Static task
static1
Behavioral task
behavioral1
Sample
7169a1ab6d4159f957321721f4c836c0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7169a1ab6d4159f957321721f4c836c0.exe
Resource
win10v2004-20231215-en
General
-
Target
7169a1ab6d4159f957321721f4c836c0
-
Size
46KB
-
MD5
7169a1ab6d4159f957321721f4c836c0
-
SHA1
5af773d7dc00e967684df690c80033c53563ddfe
-
SHA256
57a7b272338012e30eedf306eb0405888bee4ebb5616db16e666e7762ebeeac4
-
SHA512
03e864e80b411cfc09c764b44a32fc335c1a36166cc43124b78b7e2b40e93545281151a615ecf7b141d98951c3b2dd4f28c0b56e2ca89c99242f3b0a7a769146
-
SSDEEP
768:VXGIaPW1MR312Ly7d+4n1yO0YdQDW0pbEjNy0v8QfVAWLIYdNn:5+NRFqy7dUgdQP0kvuA2IYdN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7169a1ab6d4159f957321721f4c836c0
Files
-
7169a1ab6d4159f957321721f4c836c0.exe windows:4 windows x86 arch:x86
fdeef0d2845848c21a4fd96841faf0de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CreateStreamOnHGlobal
kernel32
ReadFile
OpenProcess
UnmapViewOfFile
MapViewOfFile
ReleaseMutex
WideCharToMultiByte
GetExitCodeProcess
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
LocalFree
Sleep
lstrlenW
lstrlenA
LocalAlloc
LoadLibraryA
GlobalMemoryStatus
GlobalFree
GetVolumeInformationA
GetVersionExA
GetTickCount
GetTempPathA
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetLogicalDrives
GetLocalTime
GetLastError
GetFileSize
GetDriveTypeA
GetDiskFreeSpaceA
GetComputerNameA
ExpandEnvironmentStringsA
CreateFileMappingA
CreateFileA
CloseHandle
CreateProcessA
lstrcpynA
user32
SetActiveWindow
mouse_event
SetCursorPos
GetCursorPos
wsprintfA
GetWindowRect
advapi32
GetUserNameA
RegQueryValueExA
RegOpenKeyA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
shlwapi
StrStrIA
shell32
ShellExecuteA
wsock32
gethostname
gethostbyname
connect
closesocket
WSAStartup
socket
crypt32
CryptUnprotectData
Sections
Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 5KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 230B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 239B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 234B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 262B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 301B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 349B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 419B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 424B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 414B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nah Size: 445B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE