Static task
static1
Behavioral task
behavioral1
Sample
7d66caa0aa0fec3ffb5030b43c954068.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d66caa0aa0fec3ffb5030b43c954068.exe
Resource
win10v2004-20231222-en
General
-
Target
7d66caa0aa0fec3ffb5030b43c954068
-
Size
456KB
-
MD5
7d66caa0aa0fec3ffb5030b43c954068
-
SHA1
aab2442b1db6a83c07a4f94e11a2d112de3d5c01
-
SHA256
8626beb5221ec448783541f82e700264daa5d6c67451de980219b587e31f5bc1
-
SHA512
a5d789a791cbe6ff51d4a2e9740fd80f146a626c29c85aa348618e7b79d0f4bf7b64ee7fe111c9f62c4abef235c83a6936b8ea37b7751e52b9745ce0432bc88e
-
SSDEEP
12288:yQm/wWVe1bgyXtk/xDH0FzSex292VNZrkgDAxHafi88:S/pczW/9wzSyi2nZrtQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d66caa0aa0fec3ffb5030b43c954068
Files
-
7d66caa0aa0fec3ffb5030b43c954068.exe windows:4 windows x86 arch:x86
979c46828d5561eb832e07f8364f0a06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
CloseHandle
UnlockFile
WriteFile
ReadFile
LockFile
SetFilePointer
CreateFileA
GetSystemDirectoryA
FlushFileBuffers
HeapAlloc
VirtualProtect
TlsSetValue
GetProcAddress
GetModuleHandleA
GetLastError
VirtualLock
OpenFileMappingA
SetFileApisToANSI
TerminateThread
GetTickCount
SetEvent
GetPriorityClass
HeapReAlloc
GetCurrentProcess
GetLocalTime
GetCurrentThread
VirtualQuery
RtlUnwind
GetLocaleInfoA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetClientRect
ImpersonateDdeClientWindow
MoveWindow
wsprintfA
psapi
EmptyWorkingSet
GetWsChanges
GetProcessMemoryInfo
msvfw32
DrawDibGetBuffer
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 368KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ