Static task
static1
Behavioral task
behavioral1
Sample
7d5fa9a7f89535aa353e6e31b365b334.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d5fa9a7f89535aa353e6e31b365b334.exe
Resource
win10v2004-20231215-en
General
-
Target
7d5fa9a7f89535aa353e6e31b365b334
-
Size
171KB
-
MD5
7d5fa9a7f89535aa353e6e31b365b334
-
SHA1
ae1142ad652ad214a8cd09d264470e15f59cb8df
-
SHA256
f002861611cc0f8aeabe3f7f7ce0fce7d348fff9ae26e815b797934f08ed3a57
-
SHA512
a5ba0fdb0a77abe516367485a64bdfcdf9be273deafb6894e5071fe61926622626ba9ce5dd0dbb0e4f413b0641913bde03d5826f0effcf587c9ef8eae91bee9b
-
SSDEEP
3072:F+Lo+ncA5ohCec4XsUMjOjua1ww44Z6u7ahWgLWsm244FUPYF:F+LFcA55Y6j/PaZ6u7akgLxm24VgF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d5fa9a7f89535aa353e6e31b365b334
Files
-
7d5fa9a7f89535aa353e6e31b365b334.exe windows:4 windows x86 arch:x86
c3a09231acaac7a0cfad2eb83d53f61e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetCPInfo
SetErrorMode
CreateEventA
GetACP
FreeResource
Sleep
CreateThread
lstrcpyA
ExitProcess
CloseHandle
lstrlenA
DeleteCriticalSection
HeapAlloc
GetStdHandle
lstrcmpiA
GetFileSize
CreateFileA
GetFileType
GlobalAlloc
GetCommandLineA
WriteFile
WideCharToMultiByte
GetCurrentThread
ExitThread
ResetEvent
LoadLibraryExA
VirtualAlloc
GetSystemDefaultLangID
HeapFree
GetLastError
VirtualFree
RaiseException
GetProcAddress
GetModuleFileNameA
LocalAlloc
lstrcatA
GetModuleHandleA
GetTickCount
SetFilePointer
LocalFree
GetStringTypeA
FindFirstFileA
GetFileAttributesA
GetVersion
GlobalFindAtomA
GetProcessHeap
WaitForSingleObject
CompareStringA
VirtualQuery
GetOEMCP
FreeLibrary
GlobalAddAtomA
LoadLibraryA
GetVersionExA
MoveFileExA
SetThreadLocale
lstrcmpA
SetLastError
GetDateFormatA
InitializeCriticalSection
FormatMessageA
FindClose
GetUserDefaultLCID
VirtualAllocEx
shell32
SHGetFolderPathA
SHFileOperationA
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHGetFileInfoA
comdlg32
GetOpenFileNameA
FindTextA
ole32
CoRegisterClassObject
CoCreateInstanceEx
CLSIDFromString
CoTaskMemFree
ReleaseStgMedium
shlwapi
SHStrDupA
PathIsContentTypeA
SHEnumValueA
SHGetValueA
SHQueryValueExA
PathIsDirectoryA
PathFileExistsA
SHDeleteKeyA
comctl32
ImageList_Read
msvcrt
memcpy
malloc
strcmp
atan
user32
CallWindowProcA
GetScrollPos
DefWindowProcA
GetDlgItem
EnableWindow
GetParent
GetMenuItemID
GetMenu
GetSysColorBrush
GetCursor
IsWindowVisible
DispatchMessageW
GetWindowTextA
CheckMenuItem
IsWindowEnabled
GetSubMenu
GetMenuStringA
GetWindow
SetCursor
GetMenuItemInfoA
IsChild
GetMenuItemCount
CreateMenu
GetPropA
GetScrollRange
GetCursorPos
GetMenuState
TrackPopupMenu
DrawFrameControl
GetSysColor
GetMessagePos
SetWindowTextA
GetScrollInfo
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 1KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ