Static task
static1
Behavioral task
behavioral1
Sample
7e2a531c63990c925f139c19481a8b9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e2a531c63990c925f139c19481a8b9e.exe
Resource
win10v2004-20231215-en
General
-
Target
7e2a531c63990c925f139c19481a8b9e
-
Size
89KB
-
MD5
7e2a531c63990c925f139c19481a8b9e
-
SHA1
3072ec9caca1f6f404ac525834c1bfe3018fd5b2
-
SHA256
5db99368bb08775c78e6b1e4b7d783b6e9dd6928a20ac1357972381c30d7032e
-
SHA512
64e4835bd69f46ee3b286dbf2327ea83ad15a308077164927cc5c3495872f3e7e2f1ac380ffd962b2ed60067b2589f04962ef43c284f72e87bad1107a06cfd81
-
SSDEEP
768:eLn2mXHRwnlkKPJU/V4Uk1AW4sfILv0rHyIJ/vP59+CwbCVMB4WkbTY:ENmpP+/ZKzfrHNPT+CwbCFT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e2a531c63990c925f139c19481a8b9e
Files
-
7e2a531c63990c925f139c19481a8b9e.exe windows:4 windows x86 arch:x86
76485263cf4d481094c652c5fda661ae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CloseHandle
SetEvent
ReleaseMutex
GetModuleHandleA
GetLastError
CreateThread
FindClose
SearchPathA
lstrlenA
VirtualProtect
FindVolumeClose
DeleteCriticalSection
FindResourceExA
ExitProcess
TlsGetValue
GetCalendarInfoA
Sleep
GetDiskFreeSpaceA
FindAtomA
user32
GetScrollBarInfo
EndDialog
CopyImage
DispatchMessageA
GetUpdateRect
EnableWindow
CreateWindowExA
DialogBoxParamA
CreateMenu
IsIconic
GetMessageA
GetKeyState
CloseWindow
DragDetect
msdmo
DMOGetName
DMORegister
DMOUnregister
DMOGetTypes
DMOEnum
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE