Static task
static1
Behavioral task
behavioral1
Sample
7e3fe8de94dca7aeb8d73d46d7000bbd.exe
Resource
win7-20231215-en
General
-
Target
7e3fe8de94dca7aeb8d73d46d7000bbd
-
Size
3.4MB
-
MD5
7e3fe8de94dca7aeb8d73d46d7000bbd
-
SHA1
e443a4a75eeb09c3120078cf5a251a666e76111b
-
SHA256
12373e23beeb9437e4f86bcf474a4a8f571129af9edd4ef4d7398f0fca127bf8
-
SHA512
237fb7108954509693ba0a0c4c2bdc54faec7f519c00c62e5fa5bcc5779c534678933c38605427493ce01d1b4fd290ae4bfe70a22d48706a18164e5dc3206e61
-
SSDEEP
98304:tFXSEXPJ08C7tjnQ5F1FgRrW0aQp1c1vFC:FXR08C7tjdxF1pSq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e3fe8de94dca7aeb8d73d46d7000bbd
Files
-
7e3fe8de94dca7aeb8d73d46d7000bbd.exe windows:5 windows x86 arch:x86
3215ed88d6e4bc00f109f9e970968675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidToStringW
imagehlp
ImageGetCertificateData
shlwapi
SHDeleteKeyW
kernel32
DeleteCriticalSection
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
CharUpperBuffW
gdi32
GetStockObject
advapi32
OpenThreadToken
shell32
SHChangeNotify
ole32
CoUninitialize
oleaut32
SysFreeString
ws2_32
WSAGetLastError
wldap32
ord41
mswsock
AcceptEx
Sections
.text Size: - Virtual size: 766KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 314KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ