Static task
static1
Behavioral task
behavioral1
Sample
c7897a9bd0596e462bf30d39891e5673.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c7897a9bd0596e462bf30d39891e5673.exe
Resource
win10v2004-20240226-en
General
-
Target
c7897a9bd0596e462bf30d39891e5673
-
Size
362KB
-
MD5
c7897a9bd0596e462bf30d39891e5673
-
SHA1
c62934e03c3122b8575d02799db0c6c0e8ad0f07
-
SHA256
6290e23e21beaa1b21945bfe5f4b524d2ba477a9f65e3bb8d851aacc0df7dac2
-
SHA512
0095debcbfab6cd71c8ff14eea75d7d32152ae0a01bfaf278b347d33e4405c6cfb03336a6a4266c92ac3e29f03a1dfd427e544fe3f41a3ca2ec567be078b1015
-
SSDEEP
6144:HJ/fVAhK/ASscZlXGu+YdB8bOmVq+AXYZ4lfjpcq/d6NBoSMZZdgGZT:HJ/aU/AGjGulTXCAoZ4ppcq/dQBolZj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7897a9bd0596e462bf30d39891e5673
Files
-
c7897a9bd0596e462bf30d39891e5673.exe windows:4 windows x86 arch:x86
a3226bfd5a180600bd76de6b093c9613
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
GetTickCount
FreeConsole
TlsGetValue
GetCommandLineA
LoadLibraryExW
GetComputerNameA
GetModuleHandleA
CloseHandle
CreateMutexA
ReleaseMutex
GetLastError
GetDiskFreeSpaceExW
GetExitCodeProcess
Sleep
FindClose
SetLastError
EnumResourceTypesA
VirtualProtect
GetDriveTypeA
shell32
SHGetDiskFreeSpaceA
SHGetNewLinkInfo
DragFinish
DllGetVersion
DragAcceptFiles
ShellAboutA
SHGetSettings
ShellMessageBoxA
SHFree
SHGetMalloc
StrChrA
SheChangeDirA
DragQueryFileA
glmf32
glsBlock
glsComment
glsAppRef
glsChannel
glsBinary
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ