Static task
static1
Behavioral task
behavioral1
Sample
7c515880801fa4d7d25c95b23d011e62.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7c515880801fa4d7d25c95b23d011e62.exe
Resource
win10v2004-20231215-en
General
-
Target
7c515880801fa4d7d25c95b23d011e62
-
Size
171KB
-
MD5
7c515880801fa4d7d25c95b23d011e62
-
SHA1
5651a43b82a79bca2147f4c994cee8d75a412a40
-
SHA256
351e5253f542cb9548ee1d43781cfa7e25cfe0e6b809d97a1f40a4d766b33797
-
SHA512
c36c4f5768dafd9cf89802400cc7ccacbeaa24ea6996c0cd6f89c972ba146f8146bc06fa67ca777720ff8f7090ce8fa6a47ae66f8e98f1a212964f18a9843e3c
-
SSDEEP
3072:iBJ8NHTbL5fc40JjHBnwxWF6xrLpeDf04BC13oe0G9i+eLt3dZooEclao94:ianLVctJVnwxWCpeDf04oTtfeviuR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c515880801fa4d7d25c95b23d011e62
Files
-
7c515880801fa4d7d25c95b23d011e62.exe windows:4 windows x86 arch:x86
63f88728e64d093a838b88f9e0389a5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mciSendCommandA
sndPlaySoundA
msimg32
AlphaBlend
TransparentBlt
shlwapi
PathAddBackslashA
setupapi
InstallCatalog
SetupDiGetDeviceRegistryPropertyW
CMP_WaitNoPendingInstallEvents
CM_Get_DevNode_Status
kernel32
GetProcAddress
LoadLibraryW
GlobalAddAtomW
Sleep
SetEvent
CreateThread
GetFullPathNameW
DeleteCriticalSection
ResetEvent
InitializeCriticalSection
GetTickCount
EnumResourceNamesA
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringA
WaitForSingleObject
VerLanguageNameA
LoadLibraryA
lstrcpyA
GetFullPathNameA
GetTempPathA
GetTimeZoneInformation
IsDBCSLeadByte
FileTimeToSystemTime
FreeLibrary
Sections
.text Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ