Static task
static1
Behavioral task
behavioral1
Sample
7zFM (1).exe
Resource
win10v2004-20230221-en
General
-
Target
7zFM (1).exe
-
Size
2.3MB
-
MD5
fddab410229358c5cd9325ac2901f4b8
-
SHA1
e1f3d0a5a1db1e50f28c433132e69ed3192fc289
-
SHA256
a1885825bbecce3c5c7349cdd1d4e27b8f2d43d6edd2f54fd0a2e135c7bbc86f
-
SHA512
6fd145cbd5a425b303450e8f34b3d21fb3d7205f134c94ef6ea4c2c60c7cf9e621e779aee5e103c6b66a90446af85d59bc465a1ce6ca56abb16a02fb3e90bb7e
-
SSDEEP
24576:TqC4CeReAYZKeu+Gda6ejPfUcaql5aVZGQ+xM/iicuqrA+9DyzLlSgPNnAv4TL:Td/eupjFaqlqGNuqAGilSgPNnT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7zFM (1).exe
Files
-
7zFM (1).exe.exe windows x64
716895953c50049c643af2d29e8f51fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
comctl32
ord413
ord410
CreateStatusWindowW
CreateToolbarEx
InitCommonControlsEx
ord17
ImageList_AddMasked
ImageList_GetImageCount
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
PropertySheetW
comdlg32
CommDlgExtendedError
GetOpenFileNameW
gdi32
CreateSolidBrush
SelectObject
SetBkMode
SetTextColor
GetStockObject
SetBkColor
SetDCPenColor
PolyPolyline
CreateFontIndirectW
DeleteObject
oleaut32
SysAllocString
SysAllocStringLen
VariantClear
VariantCopy
SysFreeString
SysStringLen
ole32
CoTaskMemFree
ReleaseStgMedium
CoInitialize
CoUninitialize
OleInitialize
OleUninitialize
RegisterDragDrop
RevokeDragDrop
DoDragDrop
CoCreateInstance
CoTaskMemAlloc
user32
SetDlgItemTextA
CallNextHookEx
SetWindowsHookExA
GetClassNameA
EnumChildWindows
SetClassLongPtrW
SetWindowLongPtrA
GetWindowLongPtrA
FrameRect
GetSysColorBrush
GetSysColor
RedrawWindow
SendMessageA
SetPropW
DestroyIcon
SetCursor
KillTimer
ClientToScreen
GetMenuItemCount
GetCursorPos
TrackPopupMenuEx
ChildWindowFromPointEx
WindowFromPoint
IsWindowEnabled
RegisterClipboardFormatW
FillRect
ReleaseDC
GetDC
UpdateWindow
CharUpperW
SetTimer
MapVirtualKeyW
CheckMenuRadioItem
RemoveMenu
AppendMenuW
GetSubMenu
EnableMenuItem
CheckMenuItem
DrawMenuBar
SetMenu
GetMenu
LoadMenuW
IsDlgButtonChecked
CheckRadioButton
CheckDlgButton
LoadIconW
GetClientRect
TranslateAcceleratorW
LoadAcceleratorsW
ReleaseCapture
SetCapture
GetCapture
IsZoomed
SetWindowPlacement
GetWindowPlacement
PostQuitMessage
DispatchMessageW
TranslateMessage
GetMessageW
InvalidateRect
GetKeyState
GetFocus
SetDlgItemTextW
PostMessageW
SetWindowTextW
EnableWindow
SetFocus
EndDialog
DestroyWindow
LoadBitmapW
DestroyMenu
CreatePopupMenu
MessageBoxW
CharPrevExA
LoadCursorW
GetClassInfoW
RegisterClassW
DefWindowProcW
CreateWindowExW
DrawTextW
CallWindowProcW
GetMonitorInfoA
MonitorFromWindow
SystemParametersInfoW
MapDialogRect
GetParent
SetWindowLongPtrW
GetWindowLongPtrW
ScreenToClient
GetWindowRect
GetDialogBaseUnits
GetDlgItem
DialogBoxParamW
MoveWindow
ShowWindow
GetWindowTextLengthW
GetWindowTextW
SendMessageW
LoadStringW
SetMenuItemInfoW
GetMenuItemInfoW
InsertMenuItemW
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
advapi32
SetFileSecurityW
GetUserNameW
LsaClose
LsaOpenPolicy
LsaAddAccountRights
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegOpenKeyExA
RegQueryValueExA
SystemFunction036
GetFileSecurityW
LookupAccountNameW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
shell32
SHGetSpecialFolderLocation
SHChangeNotify
ExtractIconExW
ShellExecuteW
SHFileOperationW
SHGetDesktopFolder
ShellExecuteExW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
DragFinish
DragQueryFileW
uxtheme
SetWindowTheme
GetThemeColor
DrawThemeText
DrawThemeBackground
CloseThemeData
OpenThemeData
GetWindowTheme
kernel32
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapReAlloc
FreeLibraryAndExitThread
ExitThread
CreateThread
ExitProcess
WriteConsoleW
GetModuleHandleExW
GetFileType
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
RtlPcToFileHeader
RtlUnwindEx
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
VirtualQuery
FlushFileBuffers
LoadLibraryExA
ExpandEnvironmentStringsA
SetThreadAffinityMask
ResumeThread
CreateSemaphoreW
CreateEventW
ReleaseSemaphore
ResetEvent
SetEvent
InitializeCriticalSection
VirtualFree
VirtualAlloc
GetOEMCP
lstrcatW
CompareStringOrdinal
ExpandEnvironmentStringsW
SetPriorityClass
Sleep
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
GlobalSize
GetSystemDefaultLangID
GetUserDefaultLangID
CopyFileW
WaitForSingleObject
GetCompressedFileSizeW
FindNextChangeNotification
GetVersionExW
GetCommandLineW
OutputDebugStringW
AreFileApisANSI
GetProcessTimes
DeleteCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
LocalFileTimeToFileTime
GetStdHandle
WaitForMultipleObjects
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
lstrlenW
CreateProcessW
GlobalFree
GlobalAlloc
FormatMessageW
LocalFree
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
FreeLibrary
GlobalLock
GlobalUnlock
GetProcessHeap
HeapFree
HeapAlloc
GetVolumeInformationW
GetDriveTypeW
GetDiskFreeSpaceW
DosDateTimeToFileTime
FileTimeToDosDateTime
GetSystemTimeAsFileTime
GetConsoleOutputCP
GetConsoleMode
HeapSize
GetFileSizeEx
SetFilePointerEx
LCMapStringW
FindFirstFileExW
IsValidCodePage
GetACP
GetCPInfo
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
VirtualProtect
GetStringTypeW
RaiseException
GetProcessAffinityMask
GetSystemInfo
GlobalMemoryStatusEx
GetCurrentProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
CompareFileTime
DeviceIoControl
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileSize
GetModuleHandleA
GetLogicalDriveStringsW
GetFileInformationByHandle
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindFirstChangeNotificationW
FindCloseChangeNotification
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetTickCount
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
GetTempPathW
CloseHandle
SetLastError
GetCurrentProcessId
GetCurrentThreadId
GetWindowsDirectoryW
GetModuleHandleW
GetProcAddress
MoveFileW
FindClose
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 499KB - Virtual size: 499KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gxfg Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ