Static task
static1
Behavioral task
behavioral1
Sample
7f9442aabd7c2e6e0347642615572008.exe
Resource
win7-20231215-en
General
-
Target
7f9442aabd7c2e6e0347642615572008
-
Size
193KB
-
MD5
7f9442aabd7c2e6e0347642615572008
-
SHA1
44732fa9a581e243594e782fa0b6974ba91097ca
-
SHA256
cd005a1282a833e5f3e89360cb253d727c94d038506011348ca747567db33ba6
-
SHA512
ad4a6ea30e48e78da35105be98664bf70f0258cd5c87fb636a26aa9132a844e4d136341f6e2afcf988e09e64779cbe1940b7dbc75f8cd9584e91ff518c50831b
-
SSDEEP
6144:AMogsc4kLSyjes0q6byvfb/5E3MvYJSBQd:AMUjYr6qfbBVYJrd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f9442aabd7c2e6e0347642615572008
Files
-
7f9442aabd7c2e6e0347642615572008.exe windows:4 windows x86 arch:x86
baf4b5d4f0b13284a97c2c5e28553306
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringW
SetEndOfFile
SetFileTime
GetProcessHeap
GetThreadPriority
WritePrivateProfileSectionA
SetProcessWorkingSetSize
GetCurrentDirectoryW
SetConsoleTitleA
CompareStringW
GetTapeParameters
CreateIoCompletionPort
PeekConsoleInputW
MoveFileExA
GetUserDefaultLangID
WriteConsoleOutputCharacterA
SystemTimeToFileTime
IsBadReadPtr
GlobalFindAtomA
VirtualAlloc
GetOEMCP
ReleaseSemaphore
VirtualAllocEx
EnumCalendarInfoW
EnumResourceNamesA
lstrcmpA
GetAtomNameA
SetProcessAffinityMask
GetDriveTypeA
WritePrivateProfileStructA
EnumDateFormatsW
LocalAlloc
GetHandleInformation
GetCommModemStatus
GetNumberFormatW
CopyFileExW
RemoveDirectoryA
FindFirstFileW
CreateDirectoryW
ClearCommBreak
RemoveDirectoryW
ReadDirectoryChangesW
GetStringTypeExW
GetFullPathNameA
ConnectNamedPipe
ReadConsoleA
SetMailslotInfo
VirtualQuery
FileTimeToLocalFileTime
TlsGetValue
GetProfileStringA
LeaveCriticalSection
FlushFileBuffers
LocalSize
GlobalReAlloc
GetProcessTimes
ReadFileScatter
GetCurrentProcess
GetUserDefaultLCID
SetEvent
SearchPathW
EraseTape
_hread
GetEnvironmentVariableW
WaitNamedPipeA
CompareStringA
CreateProcessA
SetFileAttributesA
SetConsoleActiveScreenBuffer
GetFileAttributesExA
WriteProcessMemory
_lread
SetupComm
GetTempFileNameA
ExitProcess
user32
GetKeyNameTextW
GetScrollInfo
GetSystemMetrics
SystemParametersInfoA
GetCaretBlinkTime
GetUserObjectSecurity
DialogBoxIndirectParamW
ShowWindowAsync
PtInRect
TileWindows
TranslateAcceleratorW
AppendMenuW
RegisterClassW
GetNextDlgGroupItem
CreateCursor
SendMessageCallbackW
SetScrollRange
GetDCEx
SetWindowWord
CreateDesktopW
CopyIcon
GetTopWindow
BringWindowToTop
GetDoubleClickTime
CopyImage
SwitchToThisWindow
IsCharAlphaNumericA
gdi32
DeleteDC
GetOutlineTextMetricsA
SetBitmapBits
BeginPath
GetTextCharacterExtra
CreateCompatibleBitmap
GetFontLanguageInfo
PlayEnhMetaFileRecord
GetSystemPaletteEntries
CreateHalftonePalette
GetObjectW
GetTextExtentExPointW
GetTextCharsetInfo
ExtFloodFill
OffsetWindowOrgEx
EnumFontFamiliesExW
comdlg32
ChooseFontA
GetOpenFileNameA
ChooseFontW
advapi32
SetEntriesInAclW
RegDeleteValueA
AllocateLocallyUniqueId
RevertToSelf
CryptGetKeyParam
SetKernelObjectSecurity
StartServiceA
RegConnectRegistryW
InitializeSid
CreateProcessAsUserA
StartServiceCtrlDispatcherA
LookupAccountNameA
OpenEventLogW
GetLengthSid
DeleteAce
GetUserNameA
CryptSignHashW
SetTokenInformation
CryptAcquireContextA
CryptAcquireContextW
CryptVerifySignatureA
RegCreateKeyExW
CryptSetProvParam
CryptEncrypt
AbortSystemShutdownW
RegCreateKeyW
CryptDeriveKey
AllocateAndInitializeSid
RegOpenKeyExA
GetSidSubAuthorityCount
shell32
SHGetSpecialFolderPathW
SHFileOperationA
DragAcceptFiles
ole32
StgSetTimes
oleaut32
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantCopy
SafeArrayRedim
SysAllocStringLen
comctl32
CreateToolbarEx
shlwapi
PathUnquoteSpacesW
UrlCreateFromPathW
SHAutoComplete
StrFormatByteSize64A
PathFindNextComponentW
StrCpyNW
PathIsNetworkPathW
StrPBrkW
StrRChrA
PathRemoveBackslashA
SHSetValueW
PathIsDirectoryA
PathAddBackslashA
PathAddBackslashW
StrRChrW
PathFileExistsW
PathRemoveBackslashW
SHCopyKeyA
StrTrimA
Sections
.text Size: 8KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ