Static task
static1
Behavioral task
behavioral1
Sample
7cb5aa296706ca4e151fd823b254b6a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cb5aa296706ca4e151fd823b254b6a6.exe
Resource
win10v2004-20231215-en
General
-
Target
7cb5aa296706ca4e151fd823b254b6a6
-
Size
32KB
-
MD5
7cb5aa296706ca4e151fd823b254b6a6
-
SHA1
39392845a86cb0dc13ef00eab86395a664a625bd
-
SHA256
7d962508f00e9a91337022e1a09646bf6ace4ccdeb615fe41d0bb453a7b52d97
-
SHA512
85cbaa445ff1eee9ef74cf2131d655e81084b30c0ec51329cc9e075673809a1d9b259070a644a5d3117d5a976894dded91cfbb7a09c0bc1f910c26d8360935de
-
SSDEEP
768:a27GPQqsiQ+AWD7MQ8Q8lbIjDHMtgH1W2kS2akhB:a27asiQ+obqMtgHsB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7cb5aa296706ca4e151fd823b254b6a6
Files
-
7cb5aa296706ca4e151fd823b254b6a6.exe windows:4 windows x86 arch:x86
b9a1fc20c1488f2ce18ed733e87e1e3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GlobalFree
LoadLibraryExA
GlobalAlloc
GetCurrentProcess
DuplicateHandle
ReadFile
GetFileSize
SetFileAttributesA
lstrcatA
GetWindowsDirectoryA
GetDriveTypeA
GetCurrentProcessId
MoveFileExA
CreateMutexA
GetFileAttributesA
SetLocalTime
GetLocalTime
Sleep
VirtualAllocEx
WriteProcessMemory
WinExec
DeviceIoControl
GetLastError
CreateFileA
WriteFile
GetSystemDirectoryA
CopyFileA
FreeLibrary
ExitProcess
LoadLibraryA
GetSystemDirectoryW
lstrcatW
GetModuleHandleA
GetProcAddress
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetModuleFileNameA
CloseHandle
user32
MessageBoxA
GetWindowTextA
WindowFromPoint
FindWindowA
GetWindowThreadProcessId
PostMessageA
GetParent
GetCursorPos
advapi32
RegCloseKey
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
shell32
ShellExecuteA
msvcrt
strstr
free
__dllonexit
_onexit
sprintf
fprintf
??2@YAPAXI@Z
strncpy
fopen
fclose
Sections
Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nah Size: 220B - Virtual size: 256B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE