Static task
static1
Behavioral task
behavioral1
Sample
a7e6bb0f128eabe73f90dbff23a2197f551d91c848a50ea0c4a7f358beb23954.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
a7e6bb0f128eabe73f90dbff23a2197f551d91c848a50ea0c4a7f358beb23954.exe
Resource
win10v2004-20230703-en
General
-
Target
a7e6bb0f128eabe73f90dbff23a2197f551d91c848a50ea0c4a7f358beb23954
-
Size
3.5MB
-
MD5
9d76fb03289e74543f56d43543a7cdab
-
SHA1
ca0ecafd5e01039e54ba8d0d1275b41bc39c56de
-
SHA256
a7e6bb0f128eabe73f90dbff23a2197f551d91c848a50ea0c4a7f358beb23954
-
SHA512
df5f8eb1c34e0e077173759f1865354d90d2832a1cddc55c060cfc5b1e3d53ae9161bcc01a67937aad112de78dc369d66571ab245b23e33306cc728fe11c293e
-
SSDEEP
98304:cWvPT7HlZM23FA1eQrmLJ7rBYFKwT6WvR0dg:cWTr0UEmdJ7WJ0m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a7e6bb0f128eabe73f90dbff23a2197f551d91c848a50ea0c4a7f358beb23954
Files
-
a7e6bb0f128eabe73f90dbff23a2197f551d91c848a50ea0c4a7f358beb23954.exe windows x86
716d82654d143c146e0285d208c70cc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
VerInstallFileA
kernel32
LoadResource
FindResourceA
GetModuleHandleA
SetErrorMode
CreateDirectoryA
GetModuleFileNameA
CreateFileA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventA
CloseHandle
WriteFile
Sleep
ReadFile
FreeLibrary
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcmpA
FindFirstFileA
GetTempPathA
LeaveCriticalSection
EnterCriticalSection
CreateThread
GetWindowsDirectoryA
GetTickCount
GetFileAttributesA
GetTempFileNameA
CreateMutexA
WaitForSingleObject
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
SetEvent
LockResource
SetFilePointer
GetDriveTypeA
OpenEventA
CreateProcessA
CopyFileA
GetCurrentThreadId
HeapAlloc
GetSystemInfo
HeapCreate
GetFileSize
lstrcpynA
lstrcatA
WritePrivateProfileStringA
GetProcAddress
LoadLibraryA
HeapDestroy
GetSystemDefaultLangID
MoveFileA
FindResourceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SizeofResource
GetVersion
GetStartupInfoA
ExitProcess
GetCommandLineA
DebugBreak
HeapReAlloc
HeapFree
VirtualQuery
VirtualProtect
SearchPathA
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
GetCurrentProcess
GetCurrentThread
RtlUnwind
lstrcpyA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
GetVersionExA
CompareStringW
CompareStringA
WideCharToMultiByte
lstrlenA
GetLastError
SetLastError
lstrcmpiA
GetPrivateProfileIntA
GetPrivateProfileStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetShortPathNameA
IsBadReadPtr
user32
MoveWindow
KillTimer
DestroyWindow
GetWindowTextA
SetTimer
SetWindowRgn
GetDesktopWindow
DialogBoxIndirectParamA
SetActiveWindow
MsgWaitForMultipleObjects
SetWindowTextA
GetDlgItem
SendMessageA
SetDlgItemTextA
LoadIconA
GetWindowRect
SystemParametersInfoA
SetWindowPos
wsprintfA
PeekMessageA
LoadStringA
CharLowerBuffA
MessageBoxA
EndDialog
CharNextA
CharUpperA
PostThreadMessageA
CreateDialogIndirectParamA
SetForegroundWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
ShowWindow
ScreenToClient
gdi32
GetTextExtentPoint32A
LPtoDP
DeleteObject
CreateFontIndirectA
GetObjectA
advapi32
RegCreateKeyExA
GetTokenInformation
AllocateAndInitializeSid
OpenThreadToken
EqualSid
FreeSid
RegCloseKey
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
CoCreateGuid
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
StringFromCLSID
CoTaskMemFree
StringFromGUID2
GetRunningObjectTable
CoTaskMemAlloc
CoMarshalInterThreadInterfaceInStream
CoReleaseMarshalData
CoInitialize
CoGetInterfaceAndReleaseStream
CoUninitialize
oleaut32
RegisterTypeLi
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantCopy
SysAllocStringLen
SysAllocString
SysStringLen
VariantClear
lz32
LZOpenFileA
LZCopy
LZClose
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ