Static task
static1
Behavioral task
behavioral1
Sample
7bb7a7282db3b13f308085e436bf77ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bb7a7282db3b13f308085e436bf77ec.exe
Resource
win10v2004-20231215-en
General
-
Target
7bb7a7282db3b13f308085e436bf77ec
-
Size
25KB
-
MD5
7bb7a7282db3b13f308085e436bf77ec
-
SHA1
20cfb10568b2ed116e056d5d78dccbb0088f17e1
-
SHA256
40bec6b42777a7f942720a4e7c3762f1082b8dd4e12ea70f83173a5e994d068b
-
SHA512
d2dc8122bd008ca5e5c3d6641914bec201dd7f372e171980e43b55c8b5dedd85029f3e2963b2ec38f20d67341ae9943c14a2362c85811b2be2de25e04dbcd3cd
-
SSDEEP
768:2fu/9k9joJJy4iC94MlVoDJlZXeDCF7LdoKUyslgog6OAvV:ApMtvlV27ZXzRHzsSog6OwV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7bb7a7282db3b13f308085e436bf77ec
Files
-
7bb7a7282db3b13f308085e436bf77ec.exe windows:4 windows x86 arch:x86
b387374957ff60d9baf6ed873ee4751a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
GetFileTime
GetWindowsDirectoryA
CreateRemoteThread
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetCurrentProcess
WriteFile
CreateEventA
GetCommandLineA
ExitProcess
CreateFileA
WaitForSingleObject
GetCurrentThreadId
CreateProcessA
CopyFileA
OpenEventA
Sleep
CreateDirectoryA
GetTempPathA
GetModuleFileNameA
GetStringTypeA
RtlUnwind
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
DeleteFileA
LoadLibraryA
GetProcAddress
VirtualFree
ResumeThread
VirtualAlloc
GetStringTypeW
user32
GetMessageA
TranslateMessage
DispatchMessageA
PostThreadMessageA
GetInputState
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RwDat Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE