Static task
static1
Behavioral task
behavioral1
Sample
d7b2d555207fd411831a1dd95ce8f372.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7b2d555207fd411831a1dd95ce8f372.exe
Resource
win10v2004-20240226-en
General
-
Target
d7b2d555207fd411831a1dd95ce8f372
-
Size
8KB
-
MD5
d7b2d555207fd411831a1dd95ce8f372
-
SHA1
727d9a97b90341e23975305c8d84cc2c80f82592
-
SHA256
ecc7147e5da49ab40fd4501db639447c7f0abeec2113252ea5c4e930a1b81651
-
SHA512
afacc6b9f6184ba7ea20b582f7c5bfb9df3d2184ea2efa52679bca25969d3532406853166886d350628986eaa33ebcc695cb4e75fa053850450e50fa1e869b5f
-
SSDEEP
192:XlrRBMAFjwnQ4PymVwYO6YCXz8UmElBW7le:1rRuAFjLQVFj/mIW7l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7b2d555207fd411831a1dd95ce8f372
Files
-
d7b2d555207fd411831a1dd95ce8f372.exe windows:4 windows x86 arch:x86
b0359257853ecb4c9fbd38a625715066
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
WinExec
GetCurrentThreadId
GetTickCount
GetTempPathA
CreateThread
lstrcpyA
GetPrivateProfileStringA
CopyFileA
DeleteFileA
lstrcatA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
VirtualProtectEx
GetCurrentProcess
GetLastError
CreateMutexA
GetCommandLineA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
CreateDirectoryA
lstrlenA
advapi32
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
fopen
sprintf
malloc
strstr
_strlwr
fclose
Sections
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE