Static task
static1
Behavioral task
behavioral1
Sample
7cfb4c6c9c8f078f7689c630fb4d9ce6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cfb4c6c9c8f078f7689c630fb4d9ce6.exe
Resource
win10v2004-20231215-en
General
-
Target
7cfb4c6c9c8f078f7689c630fb4d9ce6
-
Size
61KB
-
MD5
7cfb4c6c9c8f078f7689c630fb4d9ce6
-
SHA1
557bb144d620b8d10875bcc1676f718c6c7d36f2
-
SHA256
5918aab93b0458cb249d582de7b142c56d8e8489c7795cbd9554fc78dbc6f3cb
-
SHA512
9825890fbd5819f0908e65b26d584ebd57c811fba38601d5e19b9f5b01fae05eb7109d235d2ea3d9ee6ea645fd67700b7b450e1a60ae3409d7352313f8b62802
-
SSDEEP
768:WjMRYv7dghZEY4Mrr6nrQloyHmx1xrV36Hp9Ygq0fTNQoMhi3mWP1jEEDoSE:CZ7dg/EirdHHmx3oHogXreUmWdjbE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7cfb4c6c9c8f078f7689c630fb4d9ce6
Files
-
7cfb4c6c9c8f078f7689c630fb4d9ce6.exe windows:4 windows x86 arch:x86
388a56b1a281c193b8c8ba4094b481a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GlobalAlloc
GlobalFree
OpenProcess
CloseHandle
TerminateProcess
GetCurrentProcess
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
WriteFile
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
HeapAlloc
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
Sleep
HeapReAlloc
ole32
RevokeDragDrop
msvcrt
fopen
fseek
fclose
strlen
memcpy
strncpy
sprintf
strcmp
strncmp
wsock32
closesocket
WSACleanup
WSAStartup
gdi32
CreateSolidBrush
CreatePen
DeleteObject
GetObjectType
GetStockObject
SetTextColor
SetBkColor
comctl32
InitCommonControls
InitCommonControlsEx
user32
DestroyIcon
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
CreateWindowExA
GetSysColor
GetSysColorBrush
DestroyWindow
RedrawWindow
GetWindowLongA
RemovePropA
CallWindowProcA
SetWindowLongA
SetPropA
SendMessageA
GetParent
GetPropA
GetWindow
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
GetActiveWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassA
AdjustWindowRect
GetSystemMetrics
GetWindowRect
ShowWindow
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
MapWindowPoints
ReleaseCapture
MoveWindow
SetFocus
GetFocus
IsChild
GetClassNameA
EnumChildWindows
GetClientRect
FillRect
DefWindowProcA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
CreateServiceA
QueryServiceStatus
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenServiceA
ControlService
DeleteService
RegDeleteKeyA
RegConnectRegistryA
RegCreateKeyExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.code Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE