Static task
static1
Behavioral task
behavioral1
Sample
7b6df7bc13f2fa3ef0f66a526310b54e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b6df7bc13f2fa3ef0f66a526310b54e.exe
Resource
win10v2004-20231215-en
General
-
Target
7b6df7bc13f2fa3ef0f66a526310b54e
-
Size
242KB
-
MD5
7b6df7bc13f2fa3ef0f66a526310b54e
-
SHA1
818c87be84b01de66a641df7fc62a3e0abc4cdce
-
SHA256
ea14c0ddd978eb1ee1c5b75bbded1d977b9ef8b0a7f02dacbd72df1948853731
-
SHA512
ebb230575342be03821cf154ec6a999472772ae280f096c9f2afbf9513efc61c9594b43b8c2f0db8bc30257ab88e9fe6f599f81c166f886ff4a456fc1c651271
-
SSDEEP
6144:lvZR8D2L+mqP/lH8nNnlfttDkJsZLX0tTMPd/:lvZiqL+mUwXTIoLX0tgPd/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b6df7bc13f2fa3ef0f66a526310b54e
Files
-
7b6df7bc13f2fa3ef0f66a526310b54e.exe windows:4 windows x86 arch:x86
877a9fc2fb535473e4afdd10f8d5f137
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FatalAppExitA
GetVersionExW
GetCurrentThreadId
GetProcAddress
CreateMutexA
ReplaceFileW
LoadLibraryExA
lstrcpyW
GetSystemDefaultLCID
IsDebuggerPresent
HeapCreate
CreatePipe
GetEnvironmentVariableA
FindResourceW
lstrlenA
GetThreadPriority
FindAtomW
GetCPInfo
GetTempFileNameA
user32
EndMenu
CreatePopupMenu
MonitorFromWindow
CreateMenu
AdjustWindowRect
WinHelpA
InsertMenuItemA
MoveWindow
GetMenuInfo
LoadMenuA
DialogBoxParamW
GetKeyboardLayout
GetKeyState
GetDCEx
IsMenu
UpdateLayeredWindow
EnableWindow
CreateDialogParamA
RegisterClassW
DefWindowProcA
GetSubMenu
PostQuitMessage
CharLowerA
GetActiveWindow
CopyRect
RegisterWindowMessageW
LoadCursorA
LoadImageA
SendDlgItemMessageW
GetCursorPos
WaitMessage
GetFocus
OpenClipboard
UnregisterClassW
CreateDialogIndirectParamW
GetCaretPos
FindWindowA
SetActiveWindow
CharUpperW
GetWindowRgn
keybd_event
DestroyIcon
GetClassInfoExA
GetDesktopWindow
FindWindowW
LoadBitmapA
LoadIconW
EnumClipboardFormats
GetIconInfo
IsIconic
AppendMenuW
RegisterClassA
SetWindowPos
MessageBeep
LoadMenuW
CreateWindowExW
MessageBoxW
GetMenuItemInfoW
SendDlgItemMessageA
GetDlgItemInt
CharLowerW
DestroyMenu
GetMenuItemRect
MonitorFromRect
GetClassInfoExW
RegisterClassExW
GetDlgItemTextA
GetCapture
MonitorFromPoint
IsChild
GetScrollPos
CharPrevA
SetDlgItemTextA
TrackPopupMenu
DestroyCursor
CreateAcceleratorTableA
MessageBoxA
RegisterWindowMessageA
IsDlgButtonChecked
gdi32
RemoveFontResourceA
CreateHatchBrush
CreatePolygonRgn
CreateColorSpaceW
GetEnhMetaFileW
CreateDIBPatternBrushPt
CreateFontIndirectA
CreateDIBPatternBrush
shell32
ExtractAssociatedIconExW
StrRChrA
ExtractIconW
ShellExecuteExA
SHGetDiskFreeSpaceExW
FreeIconList
ShellExecuteEx
StrRStrIW
SHCreateDirectoryExA
SHGetDataFromIDListW
SHGetDiskFreeSpaceA
StrStrIA
StrNCmpIA
StrRStrW
ShellExecuteW
Sections
.U Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jC Size: 4KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LRK Size: 1KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.g Size: 3KB - Virtual size: 486KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ucKPZR Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pWz Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.o Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sjcOq Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.an Size: 12KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.l Size: 2KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ