Static task
static1
Behavioral task
behavioral1
Sample
7a1b1dce48c0c835c634751a956d6e57.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a1b1dce48c0c835c634751a956d6e57.exe
Resource
win10v2004-20231222-en
General
-
Target
7a1b1dce48c0c835c634751a956d6e57
-
Size
13KB
-
MD5
7a1b1dce48c0c835c634751a956d6e57
-
SHA1
d4bae5905fb495110a611f8179f07923983d986a
-
SHA256
e5d6024611a5f34383d867352533285633527bfdf57c05dc0f3a2134beb4e46f
-
SHA512
fc7a8fa4cf8d6af566680aa494d99a4202c9399e3fcd5fb6c1035f34b991fcfb9cdda932105d57328ac54104ac154cd5049bc5ced88df9cb64615f99fe6913e7
-
SSDEEP
192:eWHb/f2uT+ZHiH/LPhPsjUU6Ymwd3fimwAld/qQusPQvupjVqnLfZ:eNi6j4Yj3fi6ldqQu+TQnTZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a1b1dce48c0c835c634751a956d6e57
Files
-
7a1b1dce48c0c835c634751a956d6e57.exe windows:5 windows x64 arch:x64
928fa358fd819cdc9b84688fdb915bcf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
OpenProcess
Process32Next
Process32First
QueryFullProcessImageNameA
GetCurrentProcessId
GetCurrentThreadId
Sleep
GetTempPathA
GetModuleFileNameA
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
CreateToolhelp32Snapshot
GetLastError
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
GetSystemTimeAsFileTime
user32
KillTimer
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
shell32
ShellExecuteA
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntryA
msvcr90
free
sprintf
memset
malloc
strlen
fopen
strcat
strncpy
_amsg_exit
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
_encode_pointer
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
fseek
ftell
fclose
strrchr
strcpy
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ