Static task
static1
Behavioral task
behavioral1
Sample
d7a7f9d4addaf2bc96d78db2075d7816bed8d7c9585f3ed5b1627b6cf49af72c.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
d7a7f9d4addaf2bc96d78db2075d7816bed8d7c9585f3ed5b1627b6cf49af72c.exe
Resource
win10v2004-20230621-en
General
-
Target
d7a7f9d4addaf2bc96d78db2075d7816bed8d7c9585f3ed5b1627b6cf49af72c
-
Size
176KB
-
MD5
19ccfa0bbfba190a45e197a9500e96a4
-
SHA1
0e190340ab906abbd3218f16ce156e462beeaeea
-
SHA256
d7a7f9d4addaf2bc96d78db2075d7816bed8d7c9585f3ed5b1627b6cf49af72c
-
SHA512
2dbc4cfd58f8f86fa28a493bb82e2bbf9c68fee8cb119daf791b2046c95038ccaef50a29450e5a9f0398ecb14d36a65680aa0c29d32fb085e76b578fac1781c0
-
SSDEEP
3072:ZP7KERBMjl87IFivBhJvg4iVz2+5IEuNIR04:FKFjl8vpDigKh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7a7f9d4addaf2bc96d78db2075d7816bed8d7c9585f3ed5b1627b6cf49af72c
Files
-
d7a7f9d4addaf2bc96d78db2075d7816bed8d7c9585f3ed5b1627b6cf49af72c.exe windows x86
bf55384a4b046b8d44d26784bf678e12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
CreateThread
Sleep
GetComputerNameA
ReadFile
SetFilePointer
GetFileAttributesA
ReleaseSemaphore
CreateSemaphoreA
GetWindowsDirectoryA
GetSystemTimeAsFileTime
SearchPathA
GetModuleHandleA
GetSystemDirectoryA
GetDriveTypeA
GetLocalTime
FormatMessageA
GetCommandLineA
WaitForSingleObject
GetCurrentThreadId
SetStdHandle
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
ExitThread
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
TerminateProcess
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
ExitProcess
GetStartupInfoA
RtlUnwind
HeapAlloc
HeapFree
SuspendThread
ResumeThread
GetVersion
GetCurrentDirectoryA
SetCurrentDirectoryA
GetLogicalDrives
DeleteFileA
SetFileAttributesA
GetFileSize
WriteFile
SetEndOfFile
CreateFileA
CloseHandle
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetLastError
FreeLibrary
GetEnvironmentStringsW
SetLastError
user32
DeleteMenu
LoadImageA
FindWindowExA
SetClassLongA
RegisterWindowMessageA
CreatePopupMenu
UnregisterHotKey
SendMessageA
WinHelpA
GetCursorPos
ModifyMenuA
GetMenuItemCount
InsertMenuA
GetSubMenu
TrackPopupMenu
PostMessageA
RemoveMenu
LoadIconA
GetMenuStringA
GetMenuItemID
GetSystemMenu
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SetForegroundWindow
BringWindowToTop
GetSystemMetrics
DestroyMenu
RegisterHotKey
GetMenuItemInfoA
AppendMenuA
KillTimer
IsWindow
EndDialog
SendDlgItemMessageA
SetWindowTextA
IsWindowVisible
GetParent
CallWindowProcA
GetClientRect
ScreenToClient
GetWindow
SetWindowLongA
SetTimer
GetWindowTextA
GetWindowRect
SetWindowPos
LoadStringA
GetDesktopWindow
MessageBeep
IsWindowEnabled
CheckDlgButton
IsDlgButtonChecked
ShowWindow
SetFocus
DialogBoxParamA
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
GetWindowTextLengthA
EnableWindow
MessageBoxA
GetWindowLongA
LoadMenuA
comdlg32
GetOpenFileNameA
CommDlgExtendedError
GetSaveFileNameA
advapi32
CryptDestroyKey
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptGenRandom
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
CryptReleaseContext
CryptDestroyHash
CryptDecrypt
CryptAcquireContextA
shell32
Shell_NotifyIconA
SHFormatDrive
mpr
WNetAddConnection3A
comctl32
PropertySheetA
ord17
CreatePropertySheetPageA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ