Static task
static1
Behavioral task
behavioral1
Sample
7da0010f09d8a44769e2953aa37b927e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7da0010f09d8a44769e2953aa37b927e.exe
Resource
win10v2004-20231215-en
General
-
Target
7da0010f09d8a44769e2953aa37b927e
-
Size
124KB
-
MD5
7da0010f09d8a44769e2953aa37b927e
-
SHA1
764c9b67d700dc8f85a1fac087de35a75979cd7e
-
SHA256
f05e74eb4362fc93103592626d478448f6a012685954cdf0f4aee3730a92ded8
-
SHA512
a3f2e41b2495680177623a83b31a20fd77bbea8576eccbe3f22a13abf0ada4e88c21e828e8ec97eec7161be57c2b742f8dd04b318a15857e0d66b49dc738d36b
-
SSDEEP
3072:Cgq6xwGWb+9QHFpuM8zXeKUahC3J7EjhhURfWNFKCs6Q:3q6xwGWPrKUfVEjjG+NFqV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7da0010f09d8a44769e2953aa37b927e
Files
-
7da0010f09d8a44769e2953aa37b927e.exe windows:4 windows x86 arch:x86
1a67b9dd1d63f6be5d09fcbe3be6901b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetLastError
ReadFile
SetFilePointer
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
HeapAlloc
SetUnhandledExceptionFilter
ReleaseMutex
GetCommandLineA
Sleep
CreateThread
GetStartupInfoA
HeapFree
GetWindowsDirectoryA
SetLastError
GetTempPathA
GetTickCount
FindResourceA
LoadResource
CreateFileA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
lstrlenA
FreeResource
MoveFileA
DeleteFileA
OutputDebugStringA
MultiByteToWideChar
lstrcpyA
WideCharToMultiByte
GetCurrentProcess
CloseHandle
ExitProcess
CreateProcessA
GetThreadContext
ReadProcessMemory
GetModuleFileNameA
lstrcmpiA
GetModuleHandleA
LoadLibraryA
GetProcAddress
WriteProcessMemory
SetThreadContext
ResumeThread
TerminateProcess
GetSystemDirectoryA
lstrcatA
GetFileAttributesA
user32
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
TranslateMessage
LoadCursorA
LoadIconA
wsprintfA
GetInputState
PostThreadMessageA
DispatchMessageA
RegisterClassExA
DefWindowProcA
PostQuitMessage
advapi32
RegQueryValueExA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
RegOpenKeyExA
RegSaveKeyA
RegCloseKey
RegCreateKeyExA
RegRestoreKeyA
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegDeleteKeyA
RegDeleteValueA
LookupAccountNameA
msvcrt
_strnset
_strcmpi
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
memset
??2@YAPAXI@Z
memcpy
_except_handler3
__CxxFrameHandler
realloc
malloc
strlen
??3@YAXPAX@Z
rand
strchr
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
ntdll
ZwUnmapViewOfSection
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ