Static task
static1
Behavioral task
behavioral1
Sample
7e038a96c36c302c8570b35d3fb972eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e038a96c36c302c8570b35d3fb972eb.exe
Resource
win10v2004-20231215-en
General
-
Target
7e038a96c36c302c8570b35d3fb972eb
-
Size
60KB
-
MD5
7e038a96c36c302c8570b35d3fb972eb
-
SHA1
6d1c67e788c78d56601fd90f44bf99e1bdcb6b9a
-
SHA256
e110ace911e871280581e3c6ae35076441f0386bcd24afe94f8daf02060c6866
-
SHA512
258fe9111fe6d4841588234242f4f179753a92ca4ef56dd940c9dc9fb214ef6ab991dba973df14fd4d9d56a04356411b73286a8044d1cd1a6f4ba02c8a86f0a4
-
SSDEEP
768:G0B4k1LZ4rgqlio1teWtMsjjkhAwtAOBZU9F:PTwgqlio1tjt9jjINC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e038a96c36c302c8570b35d3fb972eb
Files
-
7e038a96c36c302c8570b35d3fb972eb.exe windows:4 windows x86 arch:x86
974e44ff984fb6c33bf87ebd6712c6a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
lstrlenA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
WritePrivateProfileStringA
GetTickCount
CreateDirectoryA
CreateThread
GetTempFileNameA
GetTempPathA
DeleteFileA
ReadFile
MultiByteToWideChar
GetACP
CopyFileA
CreateProcessA
SearchPathA
GetStartupInfoA
WriteFile
WaitForSingleObject
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
CreateFileA
DeviceIoControl
GetPrivateProfileStringA
CloseHandle
user32
FindWindowA
advapi32
CloseServiceHandle
QueryServiceStatus
StartServiceA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
CoCreateGuid
msvcrt
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
strstr
time
atol
free
??2@YAPAXI@Z
malloc
??3@YAXPAX@Z
strncmp
printf
strncpy
strrchr
sprintf
_XcptFilter
_ltoa
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@IIABV?$allocator@D@1@@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
wininet
InternetOpenA
InternetCrackUrlA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ