Static task
static1
Behavioral task
behavioral1
Sample
7f7ea319cf355d5e6b48d9260762f7533d46f6525a6644b3874b98a5e51a1266.exe
Resource
win7-20240215-en
General
-
Target
7f7ea319cf355d5e6b48d9260762f7533d46f6525a6644b3874b98a5e51a1266
-
Size
361KB
-
MD5
6b1c1115181fff234409c851a5e787b9
-
SHA1
cddb176d1ca79077ba78a7072c2fe71b9dfde7c0
-
SHA256
7f7ea319cf355d5e6b48d9260762f7533d46f6525a6644b3874b98a5e51a1266
-
SHA512
d7dbd7f8809362315734ec8ea59c90a7d14a01f3ef38966a2055aee829d96f63d564c25bfe79b79ac4ff3802f48ed60607b3a1571affc1c47369f67b11d529a7
-
SSDEEP
6144:+L7CGiBi9LfAM5IWLUQIbMJqkBwJ6EszGsXk:+3Biw9kMbDqQwAFSK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f7ea319cf355d5e6b48d9260762f7533d46f6525a6644b3874b98a5e51a1266
Files
-
7f7ea319cf355d5e6b48d9260762f7533d46f6525a6644b3874b98a5e51a1266.exe windows:5 windows x86 arch:x86
c8bd78f933f487b3d8364469467cc47a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetComputerNameW
GetTimeFormatA
FreeEnvironmentStringsA
GetModuleHandleW
FormatMessageW
GetStringTypeExW
GetFileAttributesA
GetConsoleAliasW
WritePrivateProfileStringW
GetConsoleAliasesW
SetLastError
GetProcAddress
FindVolumeMountPointClose
WriteConsoleOutputW
LoadLibraryA
LocalAlloc
SetConsoleOutputCP
ConvertDefaultLocale
GetModuleFileNameA
EnumDateFormatsA
SetConsoleTitleW
GetProcessAffinityMask
CompareStringA
DeleteCriticalSection
GetShortPathNameW
OpenFileMappingA
LocalFileTimeToFileTime
BuildCommDCBW
GlobalDeleteAtom
MultiByteToWideChar
HeapAlloc
GetLastError
HeapReAlloc
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapCreate
WriteFile
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
advapi32
DuplicateToken
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 23.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ