Static task
static1
Behavioral task
behavioral1
Sample
7ef3f1e528528b23f2cab3a6df54b196.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ef3f1e528528b23f2cab3a6df54b196.exe
Resource
win10v2004-20231215-en
General
-
Target
7ef3f1e528528b23f2cab3a6df54b196
-
Size
89KB
-
MD5
7ef3f1e528528b23f2cab3a6df54b196
-
SHA1
4b29e10b357d9a286daf861ea8d05e9ce272e796
-
SHA256
4bb24c570a352a1ea238970814671ae26e002e5ce4de4276c6cee438a1674cbd
-
SHA512
35d40c2bdd1d01b7b770298547459d577e4c91d0e0820c21c6907af4fe7765ea6643166857c2b448be3609ccbd401eaca28dfa01a8bd59e0927e62316a0c900a
-
SSDEEP
768:I4SiYLn2G2hqCniGU1JTcyZI9BZIVKRvw21nnnnRYZxe6qaKHzRUZziPcr1+ebgY:I4fGgfL4UBZiKRY+Yfrq918ciLg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ef3f1e528528b23f2cab3a6df54b196
Files
-
7ef3f1e528528b23f2cab3a6df54b196.exe windows:4 windows x86 arch:x86
28f410223faaff7f94192f8df0976fbd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetDiskFreeSpaceA
FindResourceExA
FindAtomA
SetEvent
CloseHandle
ReleaseMutex
FindVolumeClose
GetCalendarInfoA
ExitProcess
SearchPathA
GetLastError
lstrlenA
DeleteCriticalSection
VirtualProtect
GetTickCount
TlsGetValue
CreateThread
GetModuleHandleA
Sleep
user32
IsIconic
EnableWindow
DragDetect
GetKeyState
GetUpdateRect
CreateMenu
CopyImage
EndDialog
GetScrollBarInfo
DispatchMessageA
CloseWindow
GetMessageA
CreateWindowExA
DialogBoxParamA
msdmo
DMOEnum
DMOGetTypes
DMOUnregister
DMOGetName
DMORegister
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE