Static task
static1
Behavioral task
behavioral1
Sample
7f219efd6d10187e40d45601668114d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f219efd6d10187e40d45601668114d1.exe
Resource
win10v2004-20231222-en
General
-
Target
7f219efd6d10187e40d45601668114d1
-
Size
50KB
-
MD5
7f219efd6d10187e40d45601668114d1
-
SHA1
a17af663c3c79d97ef10206677f4729891e19f42
-
SHA256
e652d378883dfc3e2ce9524177747d151881dd751bc11b62b66a19c9c8153989
-
SHA512
081d2377b2b9af1deffcaf3781d018e0966fe977562c573d04b37bf547cd6a6c1df2148bdc8be489cabfe3800947bdc5a12f9c6b959ca73f213138b6d904b9d1
-
SSDEEP
768:6xjVOTGSWl9mY47lkVZ0FNCWuCw8aEgD5aIjjEDtkT3OxPUsj/zG3rX:IxSg3VZMGEc5aIvak0TCD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f219efd6d10187e40d45601668114d1
Files
-
7f219efd6d10187e40d45601668114d1.exe windows:4 windows x86 arch:x86
3e6b1f546270a32ce461b1bdc8abdb2e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigA
CloseServiceHandle
CreateServiceA
GetSecurityDescriptorControl
OpenServiceA
QueryServiceStatus
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
SetSecurityDescriptorDacl
kernel32
CloseHandle
CopyFileA
CreateFileMappingA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FindClose
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetConsoleCP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileTime
GetFileType
GetFullPathNameA
GetLastError
GetPrivateProfileStringA
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetTickCount
GetTimeZoneInformation
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
HeapAlloc
HeapCreate
HeapDestroy
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalFree
LockResource
Module32First
Module32Next
MoveFileExA
MulDiv
MultiByteToWideChar
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResetEvent
ResumeThread
SearchPathA
SetEnvironmentVariableA
SetErrorMode
SetFileAttributesA
SetUnhandledExceptionFilter
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
TlsFree
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualQuery
WaitForSingleObject
WriteConsoleA
lstrcmpiA
user32
CharNextA
CharPrevA
CheckDlgButton
ClientToScreen
CreateDialogParamA
CreatePopupMenu
DialogBoxParamA
DrawIcon
FindWindowA
GetCapture
GetClientRect
GetCursorPos
GetProcessWindowStation
GetSystemMenu
GetWindowLongA
IsDlgButtonChecked
IsWindowVisible
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
PostMessageA
RegisterClassA
ReleaseCapture
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
TranslateMessage
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ