Static task
static1
Behavioral task
behavioral1
Sample
7861fbc19fa75cb65add8740436f8798.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7861fbc19fa75cb65add8740436f8798.exe
Resource
win10v2004-20231215-en
General
-
Target
7861fbc19fa75cb65add8740436f8798
-
Size
370KB
-
MD5
7861fbc19fa75cb65add8740436f8798
-
SHA1
9ceb805d615be59fc80826c360e636fc00d60c04
-
SHA256
2e805d0b1ad8aa6f2a829e047e8b1f46f6547520163a3e669943eb1956548a7a
-
SHA512
154fcdb2559cb587e88c9aecc3130fe50316796387e235e21c9e39d26230c2c5b0b755f920790ad3a7c97754eba894195cc217dde62b6b838da67e176fa2b9d8
-
SSDEEP
6144:VK1/hj2RhYvC0L0r+diyo96+Fy74PU2JkHyEWLzxA2PyfpE:nRhuVorFyK61f2JjzLdWf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7861fbc19fa75cb65add8740436f8798
Files
-
7861fbc19fa75cb65add8740436f8798.exe windows:4 windows x86 arch:x86
aee1899d68fad1e28730c2adc3fd7b9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
BeginPaint
CharUpperW
SetCapture
GetOpenClipboardWindow
InsertMenuItemW
SetUserObjectInformationA
DdeQueryNextServer
ReplyMessage
LoadBitmapW
RegisterClassA
DefMDIChildProcW
RegisterClassExA
CascadeWindows
DdeCmpStringHandles
GetKeyboardState
GetKeyboardLayoutNameW
IsCharLowerW
GetDlgItem
GetCaretPos
CheckMenuItem
SendMessageW
WaitForInputIdle
DrawFrame
GetUpdateRect
RegisterClipboardFormatA
LoadMenuW
SetMessageQueue
gdi32
GetCharacterPlacementA
GetDeviceCaps
EnumICMProfilesA
GetNearestColor
CreateMetaFileW
kernel32
HeapReAlloc
ExitProcess
GetCurrentProcess
GetCurrentThreadId
GetCPInfo
HeapCreate
Sleep
GetSystemTimeAsFileTime
GetTimeZoneInformation
SetEnvironmentVariableA
GetTickCount
VirtualAlloc
GetACP
GetOEMCP
FlushFileBuffers
GetConsoleOutputCP
ReadFile
GetCommandLineA
HeapFree
GetStartupInfoA
CompareStringA
GetModuleFileNameW
GetProcAddress
VirtualQuery
SetUnhandledExceptionFilter
GetUserDefaultLCID
GetConsoleMode
GetTimeFormatA
HeapDestroy
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetStringTypeW
SetLastError
GetModuleHandleW
GetCommandLineW
OpenMutexA
GetSystemTimeAdjustment
SetHandleCount
FreeEnvironmentStringsW
FreeLibrary
SetStdHandle
InterlockedDecrement
TlsSetValue
CreateFileA
GetCurrentThread
SetConsoleCtrlHandler
WideCharToMultiByte
GetCurrentProcessId
HeapSize
CreateMutexA
TerminateProcess
GetFileType
GetModuleFileNameA
VirtualFree
WriteFile
QueryPerformanceCounter
GetDateFormatA
UnhandledExceptionFilter
GetStringTypeA
GetStdHandle
GetLocaleInfoW
GetLocaleInfoA
IsDebuggerPresent
GetEnvironmentStringsW
GetModuleHandleA
GetConsoleCP
EnterCriticalSection
LCMapStringA
MultiByteToWideChar
RtlUnwind
InterlockedIncrement
HeapAlloc
TlsAlloc
IsValidLocale
CreateNamedPipeW
SetFilePointer
LoadLibraryA
WriteConsoleW
LeaveCriticalSection
CloseHandle
GetStartupInfoW
InterlockedExchange
CompareStringW
TlsGetValue
GetLastError
WriteConsoleA
LCMapStringW
IsValidCodePage
EnumSystemLocalesA
TlsFree
shell32
ExtractAssociatedIconExW
SHGetFileInfo
SHChangeNotify
ShellExecuteExW
advapi32
RegCloseKey
ReportEventA
CryptGenKey
InitializeSecurityDescriptor
LookupPrivilegeDisplayNameA
CryptSetKeyParam
RegOpenKeyExA
CryptAcquireContextW
RegEnumKeyA
CryptDuplicateHash
CryptSetProviderW
RegCreateKeyExW
RegQueryMultipleValuesW
CryptSetProviderA
CryptSetProviderExW
RegEnumValueW
RegFlushKey
LookupPrivilegeDisplayNameW
CryptGetKeyParam
RegConnectRegistryW
RegCreateKeyW
CryptGetProvParam
RevertToSelf
LookupAccountNameA
comctl32
InitCommonControlsEx
wininet
IsHostInProxyBypassList
SetUrlCacheEntryInfoW
FtpGetCurrentDirectoryW
FtpCommandA
SetUrlCacheEntryGroupW
FindNextUrlCacheContainerA
Sections
.text Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 175KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ