Static task
static1
Behavioral task
behavioral1
Sample
eb7c2eddecb5548a9c0d7127cea11f5968e29e7139e1211c1d2050e2fcdacfdb.exe
Resource
win7-20240903-en
General
-
Target
eb7c2eddecb5548a9c0d7127cea11f5968e29e7139e1211c1d2050e2fcdacfdb
-
Size
360KB
-
MD5
d54ab99649df9e74801e8cccad96fe6f
-
SHA1
93ffe84322df881d6aac2084a48f7046a51789fb
-
SHA256
eb7c2eddecb5548a9c0d7127cea11f5968e29e7139e1211c1d2050e2fcdacfdb
-
SHA512
b9908e0830a8a97bb03fd28cd61240829de42e2f2da16d49e57ae65af60e3646b4da3be6b948bfe806b7f8e35f477a2a30e6dbe222ccb40a95e372d44d92327b
-
SSDEEP
6144:T9RXIdVdeqPUa51VU5qiHorWQABLsd4s:T9R4j0qPUa5bQorWQABLbs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource eb7c2eddecb5548a9c0d7127cea11f5968e29e7139e1211c1d2050e2fcdacfdb
Files
-
eb7c2eddecb5548a9c0d7127cea11f5968e29e7139e1211c1d2050e2fcdacfdb.exe windows:4 windows x86 arch:x86
c9f7e018b269f1b5fe81cf757d6f8e93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
LoadLibraryA
GetProcAddress
WriteFile
GlobalReAlloc
GlobalSize
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalAlloc
VirtualAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetModuleHandleExA
GetModuleHandleA
GetStartupInfoA
user32
GetMenu
GetDlgItem
CharLowerA
DestroyWindow
ShowWindow
WinHelpA
DefFrameProcA
EnableMenuItem
GetParent
DefMDIChildProcA
EndDialog
CharUpperA
ReleaseDC
GetDC
SendMessageA
InvalidateRect
PostQuitMessage
SendDlgItemMessageA
wsprintfA
SetWindowPos
GetClientRect
SetScrollRange
SetScrollPos
LoadStringA
EndPaint
BeginPaint
DispatchMessageA
TranslateMessage
GetMessageA
CreateDialogParamA
UpdateWindow
CreateWindowExA
RegisterClassA
LoadCursorA
DialogBoxParamA
LoadIconA
gdi32
CreatePalette
DeleteObject
SelectObject
RealizePalette
SelectPalette
SaveDC
SetWindowOrgEx
RestoreDC
LineTo
MoveToEx
DPtoLP
Rectangle
SetROP2
SetViewportExtEx
SetWindowExtEx
SetMapMode
CreatePen
GetStockObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBitmap
comdlg32
GetSaveFileNameA
GetOpenFileNameA
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
msvcrt
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
sprintf
_ftol
strncpy
strncmp
calloc
memset
strcpy
strlen
strcmp
memcpy
malloc
__set_app_type
_controlfp
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ