Static task
static1
Behavioral task
behavioral1
Sample
7cb3b90c278e7a379e8330470c129862.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cb3b90c278e7a379e8330470c129862.exe
Resource
win10v2004-20231215-en
General
-
Target
7cb3b90c278e7a379e8330470c129862
-
Size
50KB
-
MD5
7cb3b90c278e7a379e8330470c129862
-
SHA1
87c3b181cb1e167b38de732ef0a6ca9b2b16e055
-
SHA256
f0102bf20758fbe4c2dcf1043fdb86c528a90e9ed975984932ab726db57ec3c9
-
SHA512
14cdce5462e69d7985a59037fd24fc30cd4029633c3a06f14ffbc018983690383bafb88b8447dbb407b29caa75739ee7713330c99015dd930ff25fc2e8fa21b1
-
SSDEEP
1536:Zg2Limc3FpTZor07PFRea9CioctCCTnEtNLtC8aunq:Giimc3lor0bvP9Ci3tCCTnaNLtZaUq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7cb3b90c278e7a379e8330470c129862
Files
-
7cb3b90c278e7a379e8330470c129862.exe windows:4 windows x86 arch:x86
b2d4562a6df8957d4bef93394cf4f91f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoW
msvcrt
strchr
__p__fmode
swprintf
advapi32
RegOpenKeyExA
RegEnumValueW
InitializeSecurityDescriptor
RegSetValueExW
CloseServiceHandle
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
comdlg32
GetFileTitleW
GetSaveFileNameA
ChooseFontA
gdi32
SetWinMetaFileBits
GetPixel
SetViewportExtEx
Escape
CreateBitmap
Escape
user32
CharUpperA
GetSysColor
comctl32
CreateStatusWindowA
ImageList_Draw
DestroyPropertySheetPage
CreatePropertySheetPageW
ImageList_ReplaceIcon
ole32
CoRegisterClassObject
OleRegGetUserType
OleUninitialize
CoSetProxyBlanket
CLSIDFromProgID
CoRevokeClassObject
CoTaskMemRealloc
CoCreateFreeThreadedMarshaler
kernel32
ExitProcess
LoadLibraryW
GetProcessHeap
VirtualAlloc
GetStartupInfoW
GetProcessHeap
HeapFree
ExitProcess
GetStartupInfoW
GetVersionExA
GetCurrentProcess
CreateThread
GetLastError
GetCurrentProcessId
VirtualAlloc
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 12KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ