Static task
static1
Behavioral task
behavioral1
Sample
7ae07b5da3f155d0abb02c89a9a3b2da.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ae07b5da3f155d0abb02c89a9a3b2da.exe
Resource
win10v2004-20231215-en
General
-
Target
7ae07b5da3f155d0abb02c89a9a3b2da
-
Size
76KB
-
MD5
7ae07b5da3f155d0abb02c89a9a3b2da
-
SHA1
dfbde308e9d199367ff78b99b34a7cae89d17833
-
SHA256
1a75c88b7d4473cc3d5fcbce8cab4c83d4ddf0ed72b7ddffa5d297bba36d2e99
-
SHA512
a3921fef3a5afba4cd6378b05d7582e56e007c2c94730083fc5b3406faad992c5567c781c40cc91e369931fe21656706b863192dd50aee1994651cc0707962da
-
SSDEEP
1536:Hu14+x5XgAb6C4XG7cUTzJCBWX+EVolG:Ho4+LX9b6T4cUzJ1jolG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ae07b5da3f155d0abb02c89a9a3b2da
Files
-
7ae07b5da3f155d0abb02c89a9a3b2da.exe windows:4 windows x86 arch:x86
934065355896996d7e91b0ec641b86f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
Sleep
lstrcatA
lstrcpynA
lstrcpyA
GetWindowsDirectoryA
GetSystemDirectoryA
DeviceIoControl
GetVersionExA
GetVolumeInformationA
WaitForSingleObject
TerminateProcess
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
LeaveCriticalSection
EnterCriticalSection
VirtualAllocEx
OpenProcess
CreateThread
GetCurrentProcess
DeleteCriticalSection
GetCurrentProcessId
InitializeCriticalSection
OutputDebugStringA
ReleaseMutex
GetLastError
CreateMutexA
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
SetEnvironmentVariableA
SetStdHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
VirtualAlloc
IsBadCodePtr
SetUnhandledExceptionFilter
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
CreateFileA
GetFileSize
DeleteFileA
SetFilePointer
CloseHandle
CopyFileA
WriteFile
GetTickCount
FreeEnvironmentStringsA
UnhandledExceptionFilter
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
HeapSize
HeapAlloc
HeapReAlloc
WideCharToMultiByte
HeapFree
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
GetFileAttributesA
ReadFile
user32
EnumChildWindows
SendMessageA
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
FindWindowA
advapi32
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegRestoreKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
ws2_32
WSAStartup
WSACleanup
closesocket
recv
send
WSASetLastError
connect
htons
gethostbyname
inet_addr
WSAGetLastError
socket
netapi32
Netbios
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE