Static task
static1
Behavioral task
behavioral1
Sample
7236ab4d1a15cfef2be9bb83c9c33a3b.exe
Resource
win7-20231215-en
General
-
Target
7236ab4d1a15cfef2be9bb83c9c33a3b
-
Size
117KB
-
MD5
7236ab4d1a15cfef2be9bb83c9c33a3b
-
SHA1
a18cab6022abee092550727001da433fe4796568
-
SHA256
6415e937886a9f3995e1ad0a5acf3dd3a8fd6fbe8241161cf844ba1816e45573
-
SHA512
dabe6e06bf2d812f82ccf8bb9d409407b5d120eee2a47389c6b2653181ee7a5a65b4f0c9625f20230e1a646fd7a084ee7c9f60421e96e574cae563daf7bc8103
-
SSDEEP
1536:w9igQWcRlf9dXzMWafuTyrhWZqS45wYlmVGKiVWpnVRxX2tnxmavv8zrxYBOrk2t:pgAMk24+wNpVR8fUru2fl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7236ab4d1a15cfef2be9bb83c9c33a3b
Files
-
7236ab4d1a15cfef2be9bb83c9c33a3b.exe windows:4 windows x86 arch:x86
3e06f8cb29e4c29268b7c5c862919c63
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
EnumSystemLocalesA
LocalFree
GetConsoleCP
HeapSize
GetStdHandle
MultiByteToWideChar
GetCurrentThreadId
FormatMessageW
GetLocaleInfoW
CreatePipe
InterlockedDecrement
CreateThread
SetEvent
GetFullPathNameW
GetStringTypeA
CreateEventW
GetStringTypeW
ExpandEnvironmentStringsW
VirtualFree
GetTickCount
TlsGetValue
GetCommandLineA
GetProcAddress
SetFileAttributesW
LeaveCriticalSection
CompareStringW
QueryPerformanceCounter
lstrcmpW
LocalUnlock
GetExitCodeProcess
HeapFree
GetStartupInfoA
SetEnvironmentVariableA
GetLastError
WaitForSingleObject
UnhandledExceptionFilter
GetModuleHandleW
DeleteCriticalSection
LocalLock
SetEndOfFile
ResumeThread
SetLastError
FindClose
SetHandleCount
GetDriveTypeA
TerminateProcess
MulDiv
InterlockedIncrement
HeapCreate
GetOEMCP
lstrcmpiW
lstrcatW
HeapReAlloc
GetUserDefaultLCID
SetUnhandledExceptionFilter
GetTimeFormatA
LCMapStringA
GetCPInfo
CreateDirectoryW
OpenEventW
GetConsoleMode
GlobalAlloc
DeleteFileW
InterlockedCompareExchange
WideCharToMultiByte
TlsSetValue
GlobalUnlock
LCMapStringW
GetModuleHandleA
GetEnvironmentStringsW
GetCurrentDirectoryA
lstrlenW
TlsFree
VirtualAlloc
LoadLibraryA
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
SetFilePointer
ReadFile
GetSystemTimeAsFileTime
GetCurrentProcessId
VirtualQuery
InterlockedExchange
GetSystemInfo
RtlUnwind
IsBadWritePtr
GetACP
CreateFileA
CloseHandle
HeapDestroy
GetFileType
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
WriteFile
GetCurrentProcess
ExitProcess
RaiseException
GetVersionExA
user32
LoadImageW
DragDetect
PtInRect
GetSubMenu
GetWindowLongW
DeleteMenu
ToAscii
AppendMenuW
GetMonitorInfoW
GetActiveWindow
MapWindowPoints
CreateAcceleratorTableW
SetDlgItemInt
EnableWindow
MoveWindow
GetSystemMetrics
SetScrollRange
ShowScrollBar
SetWindowLongA
DialogBoxIndirectParamW
WindowFromPoint
EnableMenuItem
MonitorFromWindow
DestroyWindow
GetFocus
GetClientRect
SetScrollInfo
ScreenToClient
CreateDialogIndirectParamW
ShowCaret
IsClipboardFormatAvailable
GetKeyboardState
GetClipboardData
TranslateAcceleratorW
MessageBeep
LoadStringW
GetSysColor
TrackPopupMenu
CreateWindowExW
DefWindowProcW
DrawFrameControl
CreateDialogParamW
TranslateMessage
CheckMenuRadioItem
GetDlgItem
SetWindowTextW
CreatePopupMenu
GetWindowPlacement
UpdateWindow
DispatchMessageW
IsWindowVisible
RegisterClassExW
SendMessageW
SetMenuItemInfoW
GetMenuItemID
IsWindow
LoadIconW
MessageBoxW
BeginPaint
ScrollWindow
comdlg32
GetOpenFileNameW
PageSetupDlgW
FindTextW
GetSaveFileNameA
PrintDlgW
PageSetupDlgA
PrintDlgA
oleaut32
VariantCopy
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ