Static task
static1
Behavioral task
behavioral1
Sample
7be2e914393120fb085c5a5f5f68d761ed4223999c31a306ce9760d26667e163.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7be2e914393120fb085c5a5f5f68d761ed4223999c31a306ce9760d26667e163.exe
Resource
win10v2004-20240426-en
General
-
Target
7be2e914393120fb085c5a5f5f68d761ed4223999c31a306ce9760d26667e163
-
Size
4.8MB
-
MD5
f0e14525760b2de2fc89bf3255af32ec
-
SHA1
edcfdcca563ac8b592ce7872320ccacf79ce1f31
-
SHA256
7be2e914393120fb085c5a5f5f68d761ed4223999c31a306ce9760d26667e163
-
SHA512
f80c91821ccc0e2bdd42a2b213517bed326ebd5a9186c127c70ab2582788907956330f11b90490cf26dcfe2edfdc88162813ddd9a1a9a33b93e4e500f19c00e0
-
SSDEEP
98304:KulJPiM0jwPK54u6g77CzpXsDKMf8ltY4vyDhugSJ3sK5AQkR5:KGiKPlxx5llZiEAD5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7be2e914393120fb085c5a5f5f68d761ed4223999c31a306ce9760d26667e163
Files
-
7be2e914393120fb085c5a5f5f68d761ed4223999c31a306ce9760d26667e163.exe windows:4 windows x86 arch:x86
6f3e44c53e2d9409d63c0aa87135037d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSACleanup
kernel32
SetLastError
user32
DeleteMenu
gdi32
PtVisible
msimg32
GradientFill
winspool.drv
OpenPrinterA
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconA
ole32
CLSIDFromString
oleaut32
LoadTypeLi
comctl32
_TrackMouseEvent
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 976KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ