Static task
static1
Behavioral task
behavioral1
Sample
7995c5a0129f58f87826d40dce0e7bcf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7995c5a0129f58f87826d40dce0e7bcf.exe
Resource
win10v2004-20231222-en
General
-
Target
7995c5a0129f58f87826d40dce0e7bcf
-
Size
200KB
-
MD5
7995c5a0129f58f87826d40dce0e7bcf
-
SHA1
669d2e136a23adf09d2d42904bda5dcee19af16e
-
SHA256
44b958aa74e6cdd849438ff04956a94305dd611ef06353edc83f2b34f94a16e1
-
SHA512
3975a8a9726388b02833855b2974f6c22b32213e4437f60122b3f89c364e9da37d6c3ec5c955d777f5d955df1749c061f1bd8cddef58285590dec280f0947d3a
-
SSDEEP
6144:TlLq/I+mO31DBybYdTJgr9OuZjOVce3BHdmzG3W:xLqbN33RJgnRgVH4zGm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7995c5a0129f58f87826d40dce0e7bcf
Files
-
7995c5a0129f58f87826d40dce0e7bcf.exe windows:5 windows x86 arch:x86
2e069b08ae8bf1031380bed79edd6c9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
GetCommandLineA
RemoveDirectoryA
WaitForMultipleObjects
IsBadWritePtr
GetDriveTypeA
ExitThread
SetVolumeLabelA
CreateSemaphoreW
CreateDirectoryA
GetVersion
HeapCreate
CreatePipe
GetFileType
WriteFile
CloseHandle
AddAtomW
RemoveDirectoryA
GetModuleHandleA
GetTapeStatus
FindAtomA
Beep
FindClose
DeleteAtom
GetModuleFileNameA
uxtheme
GetThemeTextMetrics
SetWindowTheme
CloseThemeData
GetWindowTheme
IsThemeActive
GetThemeBool
GetThemeColor
DrawThemeEdge
GetThemeSysSize
CloseThemeData
OpenThemeData
DrawThemeBackground
GetThemeTextExtent
odbcbcp
bcp_bind
bcp_bind
bcp_bind
bcp_bind
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE