Static task
static1
Behavioral task
behavioral1
Sample
7bf74db8a6cc9b01b820c01d1aadb522.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7bf74db8a6cc9b01b820c01d1aadb522.exe
Resource
win10v2004-20231215-en
General
-
Target
7bf74db8a6cc9b01b820c01d1aadb522
-
Size
160KB
-
MD5
7bf74db8a6cc9b01b820c01d1aadb522
-
SHA1
7e4b6d9ea671ae1209ca105562bf5fc3574a3c8f
-
SHA256
7d202de3645b2c3ed275d27517f706b45216089253b2d8ee708cb9dd448a7df4
-
SHA512
d544dd276b8be3a27d656363618a6de34e45d2dc9eb5377a306806ecec0e8894b46c1aedab6275219549880d39b495287a48fbba41bbee334fc01d39099a1b21
-
SSDEEP
3072:QUyup4lB6sWW0C2bRkm2KrkDU8n/XHDOtbc1SOWuuLxIuuReUjvCn8OdlS33P:QUzp0WBzNCKMU8n/TScfWdrun0nSn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7bf74db8a6cc9b01b820c01d1aadb522
Files
-
7bf74db8a6cc9b01b820c01d1aadb522.exe windows:4 windows x86 arch:x86
411ed455774e5079803414f2d4f0d7ba
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
GetThreadTimes
GetUserDefaultLCID
lstrcatA
GetTapeParameters
GetCurrencyFormatA
CopyFileW
user32
MapVirtualKeyA
GetDoubleClickTime
DdeInitializeA
GetWindowContextHelpId
GetFocus
GetInputState
SetWindowWord
DeleteMenu
GetMenuCheckMarkDimensions
RegisterClassA
LoadBitmapA
CharToOemW
PackDDElParam
gdi32
GetFontLanguageInfo
AddFontResourceA
ScaleWindowExtEx
DescribePixelFormat
CreateSolidBrush
SetViewportExtEx
EnumEnhMetaFile
FlattenPath
GetTextFaceA
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 902B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE