Static task
static1
Behavioral task
behavioral1
Sample
7c73e3608c9f2296e45b9a0f645b61ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c73e3608c9f2296e45b9a0f645b61ab.exe
Resource
win10v2004-20231215-en
General
-
Target
7c73e3608c9f2296e45b9a0f645b61ab
-
Size
3.8MB
-
MD5
7c73e3608c9f2296e45b9a0f645b61ab
-
SHA1
baeb03fead22c8fc31ff07989c729fa9d157dd72
-
SHA256
79ff9dd4b617cf0620ee876e0e28a84dd4e18ad058bd8f4d81b5f44f6fb30d3e
-
SHA512
5a9932f2f0e18681e74fc6e8d18b2e141cd00f423cbefc17e96475a100a5c458da1c1512eb3c0a2e2b8c1153c9a195138187f815df41cd6ceda74f4b26276fc6
-
SSDEEP
98304:EPXwz/C1pStx8SDGyNiLzOuusGdgo3JuWleiw:EPAzCvStjiyNQOOGdgo3beiw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c73e3608c9f2296e45b9a0f645b61ab
Files
-
7c73e3608c9f2296e45b9a0f645b61ab.exe windows:4 windows x86 arch:x86
b1bd2bd341928b34184332c0196aa466
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextExtentPointA
EnumFontsA
GetTextExtentExPointA
SetBitmapBits
SetViewportExtEx
GetWinMetaFileBits
GetObjectW
Escape
CreateFontA
GetWindowOrgEx
ws2_32
WSARecvFrom
WSASetServiceW
WSANtohs
getservbyname
WSAAddressToStringW
oleaut32
SafeArrayUnaccessData
SafeArrayGetElement
QueryPathOfRegTypeLi
LoadTypeLibEx
advapi32
CreateServiceA
DeregisterEventSource
CryptSetProvParam
CryptImportKey
CryptAcquireContextW
AddAccessAllowedAce
QueryServiceStatus
LogonUserW
CryptAcquireContextA
CloseServiceHandle
EnumServicesStatusA
SetNamedSecurityInfoA
SetSecurityDescriptorSacl
GetTokenInformation
CryptSetHashParam
RegConnectRegistryW
BuildTrusteeWithNameW
LookupPrivilegeDisplayNameA
user32
GetProcessWindowStation
SetPropA
GetMenuItemInfoW
ValidateRgn
kernel32
VirtualLock
SetLastError
LocalLock
GetFileInformationByHandle
ReleaseMutex
LocalFileTimeToFileTime
SetCurrentDirectoryA
GlobalFlags
DeleteFiber
UnmapViewOfFile
SuspendThread
OutputDebugStringA
GetCurrentProcess
TlsGetValue
DebugBreak
ExitProcess
TryEnterCriticalSection
GetDiskFreeSpaceW
RaiseException
GetNumberFormatW
EnumCalendarInfoA
GetCurrentDirectoryW
ReadFileScatter
GlobalReAlloc
GetStringTypeExW
CreateMutexW
VirtualFree
lstrcmpiA
SetThreadLocale
EraseTape
QueryDosDeviceA
SetProcessWorkingSetSize
LocalAlloc
IsBadWritePtr
GlobalAddAtomW
SystemTimeToFileTime
GetThreadContext
lstrcpynA
msvcrt
asctime
putc
_umask
_fullpath
isleadbyte
_fdopen
_endthreadex
fclose
wcscat
ferror
_wstrtime
getenv
getchar
atoi
frexp
rewind
fwprintf
perror
_mbstrlen
Sections
.text Size: 10KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ