Static task
static1
Behavioral task
behavioral1
Sample
7ddecd2d5b2c06cb2c6c0a35d3593488.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ddecd2d5b2c06cb2c6c0a35d3593488.exe
Resource
win10v2004-20231215-en
General
-
Target
7ddecd2d5b2c06cb2c6c0a35d3593488
-
Size
244KB
-
MD5
7ddecd2d5b2c06cb2c6c0a35d3593488
-
SHA1
1ec249c17a69a68f2febb7a838c58a6d0d38491d
-
SHA256
6037513ba8e9d3833d9da615b850daf777b951f53f2e5ca977033cb947808005
-
SHA512
cd1192e445783fdd61c2e0617e1a7e556ca9105bc51592cf38d18975bd06eac964a33d1414104c3db2328dc687a22bcbda983d5c9fc5359517347bcdeb12862c
-
SSDEEP
6144:ERagjZJibr5Pw+7A836eLq0wmZhpm2WHu:ERjjZ21Pw+BKeLpTO1O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ddecd2d5b2c06cb2c6c0a35d3593488
Files
-
7ddecd2d5b2c06cb2c6c0a35d3593488.exe windows:4 windows x86 arch:x86
170b898d331e506e2685e0156bb01047
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
ExitProcess
GetTempPathA
VirtualAllocEx
LoadLibraryW
CreateSemaphoreA
FreeLibrary
VirtualFreeEx
SetLastError
CreateMutexA
GetModuleHandleA
GetTickCount
ReadFile
CreateFileA
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
LoadLibraryA
CreateEventA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
DeleteFileA
UnlockFileEx
LockFileEx
GetSystemDirectoryA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
SetStdHandle
GetCurrentProcess
TerminateProcess
HeapReAlloc
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
GetCurrentDirectoryA
SetCurrentDirectoryA
CloseHandle
GetProcAddress
GetModuleHandleW
VirtualAlloc
GetLastError
Sleep
VirtualFree
VirtualProtect
GetStringTypeW
FindResourceExA
user32
TranslateMessage
ReleaseDC
ShowCaret
HideCaret
DispatchMessageA
GetDesktopWindow
IsWindow
IsWindowVisible
SetWindowRgn
CopyImage
DestroyIcon
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
DrawIcon
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
GetDC
DefWindowProcA
gdi32
CreateCompatibleBitmap
GetObjectA
EnumObjects
CreateDCA
CreatePen
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetDeviceCaps
GetDIBits
shell32
StrStrIA
ole32
CoUninitialize
CoInitialize
Sections
.text Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: - Virtual size: 552KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ssl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE