Static task
static1
Behavioral task
behavioral1
Sample
se12y5vmexe.dll
Resource
win7-20230621-en
General
-
Target
se12y5vmexe.exe
-
Size
311KB
-
MD5
7750ba949e4b090260827a4d8be63efc
-
SHA1
ee0e268bfa0e49591dcf77f32d7da94515d03c82
-
SHA256
8521e047f78ccf64777d40e44fb86a95f900e0ed594bb4f01cc6802ff412c536
-
SHA512
464c3ac243bb8b3bad6419d10d5c9112dbb658e13256b722325bb42bcb11c464192683cb814568ecb431bf28aa3b58cbd7061f8c273b5ee3ac700948876eb315
-
SSDEEP
6144:WH9O040SSrnmrwc4oU2FmrEaoGAC+Y5H2V3B918juwN:i9O02Srnh0qEJC+Y218jdN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource se12y5vmexe.exe
Files
-
se12y5vmexe.exe.dll windows x86
59b24abed3cd05ead29d8782a370b92c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
LoadLibraryA
GetProcAddress
GetModuleHandleW
QueryPerformanceCounter
GetCommandLineW
ExpandEnvironmentStringsW
CreateEventW
CreateThread
WaitForSingleObject
InterlockedIncrement
MultiByteToWideChar
LoadLibraryW
FormatMessageW
GetTickCount
Sleep
OpenEventW
SetEvent
CloseHandle
GetStdHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatW
LocalAlloc
GetTimeFormatW
LocalFree
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
GetFileType
WriteFile
WideCharToMultiByte
WriteConsoleW
GetTimeZoneInformation
FreeLibrary
GetShortPathNameW
CreateProcessA
GlobalUnWire
lstrlenA
MoveFileA
MoveFileWithProgressA
SetCommTimeouts
GetConsoleAliasW
SetConsoleCtrlHandler
GetSystemInfo
GetSystemPowerStatus
GetVolumePathNameW
SetComputerNameA
ReadConsoleOutputCharacterW
GetDriveTypeW
FindFirstVolumeW
DeleteFileW
FindNextVolumeW
FindVolumeClose
GetVolumePathNamesForVolumeNameW
GetFileInformationByHandle
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrcpyW
IsBadReadPtr
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetVolumeNameForVolumeMountPointW
ReleaseMutex
OpenMutexW
CreateMutexW
FindFirstFileW
FindNextFileW
FindClose
HeapFree
ReadFile
lstrcatW
IsBadWritePtr
GetProcessHeap
HeapAlloc
lstrcmpiW
lstrlenW
CreateFileA
FileTimeToDosDateTime
GetFileAttributesA
SetLastError
user32
LoadCursorA
LoadStringW
DialogBoxParamW
EndDialog
GetDlgItem
EnableWindow
SendDlgItemMessageW
wsprintfW
CharUpperW
wvsprintfA
IsCharUpperW
UnionRect
RegisterClassW
EnumPropsExW
IsHungAppWindow
RegisterClassA
SetPropA
MessageBoxA
CharLowerA
AdjustWindowRect
LoadMenuIndirectW
GetTopWindow
DdePostAdvise
WaitForInputIdle
SetWindowRgn
GetMenuItemRect
RemoveMenu
RegisterWindowMessageW
IsWindowUnicode
ChangeMenuW
MessageBoxIndirectW
MapVirtualKeyExW
GetUserObjectInformationW
ReleaseDC
GetWindowLongW
SetCaretPos
GetKeyboardLayoutNameA
SetMenu
CopyAcceleratorTableA
GetKBCodePage
SwitchDesktop
gdi32
GetTextCharacterExtra
RealizePalette
InvertRgn
GetStretchBltMode
RoundRect
RemoveFontResourceTracking
GetTextExtentExPointW
EngStretchBlt
GetDeviceCaps
GetTextExtentExPointWPri
GetCharacterPlacementA
GetCharABCWidthsFloatA
SetDCPenColor
SetGraphicsMode
SetWorldTransform
GetOutlineTextMetricsW
XLATEOBJ_piVector
CLIPOBJ_ppoGetPath
SetRectRgn
GetRgnBox
GdiGetDC
GdiConvertAndCheckDC
CopyEnhMetaFileA
GetEnhMetaFileA
EngCreateSemaphore
CreateFontW
GetTextExtentPoint32W
EngComputeGlyphSet
SetTextColor
ModifyWorldTransform
GdiSetLastError
GdiGetLocalDC
GetTextFaceW
CreateFontIndirectExA
SetDIBits
BitBlt
GdiDescribePixelFormat
PolyTextOutW
EngDeleteSemaphore
GdiCleanCacheDC
advapi32
RegOpenKeyA
StartServiceCtrlDispatcherW
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegConnectRegistryW
RegOpenKeyW
RegSetValueExW
OpenSCManagerW
OpenServiceW
ControlService
RegCloseKey
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerExW
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetSecurityInfo
SetEntriesInAclW
AllocateAndInitializeSid
RegEnumKeyW
CloseEventLog
ReadEventLogW
OpenEventLogW
FreeSid
shell32
CommandLineToArgvW
SHPathPrepareForWriteW
SHAppBarMessage
FindExecutableW
SHGetDiskFreeSpaceA
SHGetFileInfoA
SHIsFileAvailableOffline
SHBrowseForFolderA
SHPathPrepareForWriteA
DragQueryPoint
SHGetDataFromIDListW
ShellExecuteExW
ShellExecuteEx
SHFileOperationW
ShellExecuteExA
ShellExecuteA
DragQueryFileW
SHGetFolderLocation
ExtractIconEx
shlwapi
StrRChrA
StrChrA
StrRChrW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 225B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata3 Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2 Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata2 Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text4 Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ