Static task
static1
Behavioral task
behavioral1
Sample
7a5a248552f7c61f56e9008ec101b186.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a5a248552f7c61f56e9008ec101b186.exe
Resource
win10v2004-20231215-en
General
-
Target
7a5a248552f7c61f56e9008ec101b186
-
Size
276KB
-
MD5
7a5a248552f7c61f56e9008ec101b186
-
SHA1
4402b130817c43f760a00306db6500df20b5266d
-
SHA256
b56c4c8528cf5a995a7b68ca0b0e48872ff4af10f7c85d0620dbda4c7fdd5d48
-
SHA512
6d93d8c4a96c60eb4d91ef0ef1f8f9ad9738bf90e6c0aaa97ee5cb7ae5101001e47d32d58b647c948b35af868ecc25e675365f1d87661277b79a6dd1770fd34d
-
SSDEEP
3072:gBDox4OZhIckpyXIfxTf8FoadatQG7eu6F7MyJO+mqQ8j0ocUC9XD2sZahOkFJg:QDG1ZDvuxTf8aadatxeu6Of6hhZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a5a248552f7c61f56e9008ec101b186
Files
-
7a5a248552f7c61f56e9008ec101b186.exe windows:4 windows x86 arch:x86
25deb9eb77be6242ac179ccd0a3f5859
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetTickCount
SizeofResource
UpdateResourceA
DeleteFileA
CloseHandle
ReadFile
CreateFileA
FreeResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
GetModuleHandleW
GetProcAddress
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
EndUpdateResourceA
BeginUpdateResourceA
CreateEventA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
GetStringTypeW
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
VirtualQuery
VirtualFree
FreeLibrary
CreateSemaphoreA
LoadLibraryW
WaitForSingleObject
VirtualAllocEx
Sleep
VirtualAlloc
GetTempPathA
ExitProcess
GetLastError
user32
TranslateMessage
DispatchMessageA
GetDesktopWindow
IsWindow
IsWindowVisible
LoadBitmapA
SetWindowRgn
DrawIcon
DestroyIcon
CopyImage
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
HideCaret
GetDC
ReleaseDC
ShowCaret
GetClientRect
gdi32
EnumObjects
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetCharWidth32A
TextOutA
GetObjectA
GetDIBits
CreateCompatibleBitmap
GetDeviceCaps
CreatePen
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 18KB - Virtual size: 606KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ssl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE