Static task
static1
Behavioral task
behavioral1
Sample
7a04118012045becdd097be62c145e00N.exe
Resource
win7-20240729-en
General
-
Target
7a04118012045becdd097be62c145e00N
-
Size
65KB
-
MD5
7a04118012045becdd097be62c145e00
-
SHA1
51bfbdfb5b158492a546a813e9611107d7bad7f6
-
SHA256
7f9200d64a0be596d0c01b1853ff6ef6d3d0799286265a1b95e2e61de611a15c
-
SHA512
5a2a0326aaffbc77606898e9979fb1c96a47762359e74651407eecf4a51e51eec05ea48e4c979815fda16e0a1c11e058691ae800809e90ac949ac7771b75a0ed
-
SSDEEP
768:ErzHIr42KUtWafMjFDWkCO05EsCC/s3NhfAoiDCIElPbAX2n0fjr:Er9ZaidWVOEE3NxweIElDAmnqjr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a04118012045becdd097be62c145e00N
Files
-
7a04118012045becdd097be62c145e00N.exe windows:4 windows x86 arch:x86
e95e3c19c1b1846eddfe9b97188d572c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
CreateProcessW
DeleteFileA
ExitProcess
GetCommandLineW
GetModuleFileNameA
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
HeapAlloc
ReadFile
SetFileAttributesA
SetFilePointer
WriteFile
ntdll
NtFlushInstructionCache
NtOpenKey
NtProtectVirtualMemory
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE