Static task
static1
Behavioral task
behavioral1
Sample
7e8aee06e69304e4ee8e64053ba90717.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e8aee06e69304e4ee8e64053ba90717.exe
Resource
win10v2004-20231215-en
General
-
Target
7e8aee06e69304e4ee8e64053ba90717
-
Size
39KB
-
MD5
7e8aee06e69304e4ee8e64053ba90717
-
SHA1
3ec2b0b8e55ecaa54f45207e32a8ec0ac25b1225
-
SHA256
c7978b06c7f1d2da64cfb9b008e5fc9569e0ab3ec2e994e32d3a2733cdded96b
-
SHA512
8214abbd67f5ac820d09b2741eede0c2df09fa0b33d9ce8cfbded28f6533f29209ced0e0b0287db6bc8af62ef40231023fc1530917f45feaca400dae29f7e51b
-
SSDEEP
768:+FeONkmfKcMf8XYQZ42aQzH4aKQ9p8CGCGbzmk09+ZPfuz:IeWkoKcM0XYXaKiaCGfbzmj+g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e8aee06e69304e4ee8e64053ba90717
Files
-
7e8aee06e69304e4ee8e64053ba90717.exe windows:4 windows x86 arch:x86
8e5414af8f59bbe031424885c3422e1a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileExA
ExitProcess
GetConsoleMode
GetProcessWorkingSetSize
ReadConsoleInputA
ReadConsoleInputW
ResetWriteWatch
SetComputerNameW
TerminateThread
UnmapViewOfFile
advapi32
CreateProcessAsUserW
CryptDecrypt
CryptEnumProviderTypesA
CryptGetDefaultProviderA
CryptSetProviderExW
CryptSignHashW
GetAccessPermissionsForObjectW
GetServiceDisplayNameA
GetTrusteeTypeW
LookupSecurityDescriptorPartsA
RegConnectRegistryW
RegSetKeySecurity
RevertToSelf
SetEntriesInAclA
SetNamedSecurityInfoA
user32
ChangeMenuW
ClientToScreen
CopyAcceleratorTableW
DdeInitializeW
DestroyIcon
DlgDirSelectComboBoxExA
EndPaint
GetClipboardFormatNameW
GetMenuStringW
GetScrollInfo
SetUserObjectSecurity
ShowWindowAsync
SwitchToThisWindow
UnhookWindowsHookEx
WINNLSGetEnableStatus
Sections
.text Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE