Static task
static1
Behavioral task
behavioral1
Sample
7adb40b918bd978bfaa8a77a83ae63831a2316624e55eeceaee335a2c3c13748.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7adb40b918bd978bfaa8a77a83ae63831a2316624e55eeceaee335a2c3c13748.exe
Resource
win10v2004-20240802-en
General
-
Target
7adb40b918bd978bfaa8a77a83ae63831a2316624e55eeceaee335a2c3c13748
-
Size
365KB
-
MD5
ce60d5257e292144718860018ad9a1bf
-
SHA1
a7114260963372b6904c155be6a2d80ccd4fca72
-
SHA256
7adb40b918bd978bfaa8a77a83ae63831a2316624e55eeceaee335a2c3c13748
-
SHA512
772802e69a637473e3dccea45dc4dbfd4abef9eca6aef910ca2f28410d850f8eb835f5e29ad47a2ac973ca2779640628ff1f2f3b496905dcb1fee0cdf0ee0e1a
-
SSDEEP
6144:zUJqJPqFhE7klI7rbMQMUHU1btDWIY1eL0oEF4Z0s8i1ZG2QHtdG:mq0FDlI7kQMAiRDWIY1+z08BGG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7adb40b918bd978bfaa8a77a83ae63831a2316624e55eeceaee335a2c3c13748
Files
-
7adb40b918bd978bfaa8a77a83ae63831a2316624e55eeceaee335a2c3c13748.exe windows:5 windows x86 arch:x86
c1c4bd1e8d9d304d0d573138f5d9592f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
FindFirstFileW
FindClose
GetCommandLineW
GetTempPathW
FindResourceW
SizeofResource
LoadResource
LockResource
DeleteFileW
WaitForSingleObject
CloseHandle
GetVersionExW
lstrcatW
lstrcmpW
SetPriorityClass
GetCurrentProcess
Process32NextW
GetCurrentThread
ExitProcess
GetProcessHeap
SetEndOfFile
HeapReAlloc
CreateFileW
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetStringTypeW
LCMapStringW
SetFilePointer
HeapSize
Process32FirstW
GetLastError
CreateToolhelp32Snapshot
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
SetThreadPriority
Sleep
GetTickCount
QueryPerformanceCounter
HeapCreate
GetFileType
SetHandleCount
GetSystemTimeAsFileTime
GetFileAttributesW
GetProcAddress
GetModuleHandleW
DecodePointer
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EncodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
DeleteCriticalSection
LoadLibraryW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
ReadFile
user32
MessageBoxW
advapi32
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyW
RegOpenKeyExW
RegEnumValueW
shell32
ShellExecuteW
SHChangeNotify
ShellExecuteExW
SHGetSpecialFolderPathW
CommandLineToArgvW
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ