Static task
static1
Behavioral task
behavioral1
Sample
7c18f0f7d23f6a4912a28c16103d6fdc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c18f0f7d23f6a4912a28c16103d6fdc.exe
Resource
win10v2004-20231215-en
General
-
Target
7c18f0f7d23f6a4912a28c16103d6fdc
-
Size
17KB
-
MD5
7c18f0f7d23f6a4912a28c16103d6fdc
-
SHA1
f2b12010dced13068630cd0cbe4de3c51de21667
-
SHA256
2619dab54015307d907a9bc0f8ba6ff2e3d4fb0efbe2e750cd59f00437f1ab65
-
SHA512
7006481a8659efbbcdc905f8d3afe716a15d3389fa6c01f0bf1b6fc26fbb563a89c085550a8403da7f975d737378fc4a2e9a72983768728d23574b31c3f257de
-
SSDEEP
384:X5G3C6QE2rRwcLBUBmZMq1AlgSCQVCp2lf:XKC/WczZN0gSlCp25
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c18f0f7d23f6a4912a28c16103d6fdc
Files
-
7c18f0f7d23f6a4912a28c16103d6fdc.exe windows:4 windows x86 arch:x86
e77291a1f41a3809dd02806e498895b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
SetThreadContext
GetThreadContext
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
CreateProcessA
HeapFree
HeapAlloc
GetProcessHeap
Sleep
ExitProcess
LoadLibraryA
GetTempFileNameA
GetTempPathA
MoveFileExA
GetModuleFileNameA
GetCurrentProcessId
GetProcAddress
GetVersion
ws2_32
closesocket
recv
send
connect
WSAStartup
socket
gethostbyname
htons
wininet
InternetCloseHandle
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
iphlpapi
GetAdaptersInfo
IpReleaseAddress
IpRenewAddress
GetInterfaceInfo
msvcrt
_strdup
strstr
strncpy
sprintf
free
atoi
_snprintf
strtok
strncmp
malloc
Sections
.text Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE