Static task
static1
Behavioral task
behavioral1
Sample
c0d7a664b120d11300b9f786f3d78550.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c0d7a664b120d11300b9f786f3d78550.exe
Resource
win10v2004-20240226-en
General
-
Target
c0d7a664b120d11300b9f786f3d78550
-
Size
1.6MB
-
MD5
c0d7a664b120d11300b9f786f3d78550
-
SHA1
7721f1f2f50e310752501fc36f38024cd8f9ccdb
-
SHA256
b628148ce69e72e3911fecc6214f09ab7eaab36e040080b03e039ffa7294de67
-
SHA512
01aa25d7c3309945b6b8c4d6d470f9168ccdef021d20a729bed906fce3a69cf44d6f7cfc478bda359ca2805c94d3ea0afaa833244f60a07e91e45ff2dddf1be8
-
SSDEEP
12288:vu9MsBj7TbVc+MFdK8zWqiTSGIrzguvYDyph:NWXTBcFrK8zWqiS5gQXh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0d7a664b120d11300b9f786f3d78550
Files
-
c0d7a664b120d11300b9f786f3d78550.exe windows:4 windows x86 arch:x86
e3375863abbd62135baac702f4deff18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentDirectoryA
GetShortPathNameA
FindResourceExA
EnumResourceLanguagesA
ResumeThread
WriteProcessMemory
LocalFree
GetCurrentThreadId
SetFileAttributesA
CreateDirectoryA
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
InitializeCriticalSection
HeapValidate
lstrcatA
WideCharToMultiByte
RtlUnwind
GetStringTypeW
user32
SetFocus
AdjustWindowRectEx
DefWindowProcA
advapi32
RegCreateKeyA
RegSetValueA
RegCloseKey
ole32
CoRegisterClassObject
ReadClassStm
Sections
0 Size: 356KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1 Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
4 Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
5 Size: 7KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
6 Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7 Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
8 Size: 48KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
10 Size: 10KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE