Static task
static1
Behavioral task
behavioral1
Sample
7719da6f63d95f275dc605fca98e8f0d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7719da6f63d95f275dc605fca98e8f0d.exe
Resource
win10v2004-20231215-en
General
-
Target
7719da6f63d95f275dc605fca98e8f0d
-
Size
176KB
-
MD5
7719da6f63d95f275dc605fca98e8f0d
-
SHA1
6f65c380342df89726aa91081e093e5cf73ab4ab
-
SHA256
798f152cc95e636866b8053c4e3d67c1b99b713470492b596c44249e340cdec8
-
SHA512
dc8360860d81ac5de609edc6210cd6bfaf438893d19052b0268107105022a1481a56d4a7669d5ae164fd7e5f31a102a5f23b1bd419cc972731f4888871470d1e
-
SSDEEP
3072:tUQjOSAou9Ius7FkDhGul2UVvQook9+vQ2Lyb3Vlso3CqC+Ku4C+vk:qZ99IXkoavQHk9+YYevv3fcC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7719da6f63d95f275dc605fca98e8f0d
Files
-
7719da6f63d95f275dc605fca98e8f0d.exe windows:4 windows x86 arch:x86
c70ad0dc78abae42d34ad1f1743f61e3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
ChangeServiceConfig2A
ControlService
OpenProcessToken
OpenServiceA
RegCloseKey
RegDeleteKeyA
RegFlushKey
RegisterServiceCtrlHandlerA
kernel32
CompareStringA
ContinueDebugEvent
CreateDirectoryA
CreateFileA
CreateFileMappingA
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DisableThreadLibraryCalls
EnumSystemLocalesA
ExitProcess
FindClose
FindNextFileA
FindResourceA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetConsoleCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetFileTime
GetFileType
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemTimeAsFileTime
GetTempPathA
GetThreadLocale
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetWindowsDirectoryA
GlobalFree
GlobalReAlloc
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsBadReadPtr
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LockResource
Module32First
MoveFileExA
MulDiv
MultiByteToWideChar
OpenEventA
QueryPerformanceCounter
ReleaseMutex
SetEnvironmentVariableA
SetErrorMode
SetLastError
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsGetValue
UnhandledExceptionFilter
VirtualFree
VirtualQuery
lstrcmpA
lstrcpyA
user32
CharPrevA
CreateWindowExA
DestroyIcon
DrawIcon
EndPaint
FindWindowA
GetActiveWindow
GetClientRect
GetFocus
GetSysColorBrush
GetSystemMetrics
GetWindowDC
GetWindowLongA
GetWindowTextA
GetWindowThreadProcessId
LoadCursorA
LoadIconA
MessageBoxA
RegisterClassA
SendDlgItemMessageA
SetCapture
SetDlgItemTextA
UnregisterClassA
WinHelpA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 115KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
kkhlg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
fflkl Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ