Static task
static1
Behavioral task
behavioral1
Sample
7f872923332ae31e4f2c54a32d302b9c7d61184a1495c76ae22fbf63032c1daa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7f872923332ae31e4f2c54a32d302b9c7d61184a1495c76ae22fbf63032c1daa.exe
Resource
win10v2004-20230915-en
General
-
Target
7f872923332ae31e4f2c54a32d302b9c7d61184a1495c76ae22fbf63032c1daa
-
Size
195KB
-
MD5
f14ac4ea4d19f7d33f7253f95643cb17
-
SHA1
cb5ffdfb9cefec60792ec28e3cf77da4311cd5f6
-
SHA256
7f872923332ae31e4f2c54a32d302b9c7d61184a1495c76ae22fbf63032c1daa
-
SHA512
3f757f75cb1da1f09cadc879c6b384d672d2ca5473ae76c32f19a3a4cf87762d0da9cb7a800deab9330990efc5d06c7e531bb8040111dfb5b9f7d957a0893e06
-
SSDEEP
3072:zjhHZ5tHvR97WvsCgkjNRdf4Yfocq4W0hrClqCF2anM2UnC91K:3vbWvekjN9Y2T2XbK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f872923332ae31e4f2c54a32d302b9c7d61184a1495c76ae22fbf63032c1daa
Files
-
7f872923332ae31e4f2c54a32d302b9c7d61184a1495c76ae22fbf63032c1daa.exe windows:4 windows x86
6e9c4d8deba6aec246584caba70b6635
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
PropertySheetW
CreatePropertySheetPageW
ws2_32
inet_addr
socket
send
connect
recv
closesocket
gethostname
gethostbyaddr
getservbyport
ntohs
inet_ntoa
htonl
getservbyname
htons
WSAGetLastError
gethostbyname
wininet
InternetCloseHandle
InternetQueryOptionA
InternetGetLastResponseInfoW
InternetOpenUrlW
InternetErrorDlg
InternetSetOptionW
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetAttemptConnect
InternetCrackUrlW
HttpQueryInfoW
InternetReadFile
DetectAutoProxyUrl
kernel32
FlushFileBuffers
SetStdHandle
GetCurrentDirectoryW
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
LoadLibraryW
GetLastError
GetTempPathA
GetTempFileNameA
DeleteFileA
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
CloseHandle
Process32NextW
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
WaitForSingleObject
ResumeThread
TerminateThread
Sleep
InitializeCriticalSection
DeleteCriticalSection
ReadFile
CreateFileW
GetTickCount
DeleteFileW
lstrcpyW
lstrcatW
lstrlenW
lstrcpynW
GetDiskFreeSpaceExW
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
WritePrivateProfileStructW
FindResourceW
SizeofResource
LockResource
LoadResource
FindResourceExW
GetTempPathW
GetModuleFileNameW
CreateDirectoryW
IsBadReadPtr
GetVersion
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExW
WriteFile
InterlockedExchangeAdd
SetFilePointer
FormatMessageW
GetModuleHandleW
GlobalFree
LocalFree
SetCurrentDirectoryW
CreateProcessW
CreateMutexW
CopyFileW
GetCurrentThreadId
WinExec
SetErrorMode
GetExitCodeProcess
MoveFileExW
RaiseException
GetFileSize
GetSystemTime
GetDriveTypeW
CreateThread
Module32First
Module32Next
GetModuleFileNameA
Process32First
Process32Next
GetFileTime
GetSystemDirectoryW
MoveFileW
GetTimeZoneInformation
GetCPInfo
GetOEMCP
GetFullPathNameW
GetCurrentDirectoryA
UnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
RtlUnwind
GetStartupInfoW
GetSystemTimeAsFileTime
GetLocalTime
GetCurrentProcess
GetModuleHandleA
ExitProcess
FindFirstFileW
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
ExitThread
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
FreeEnvironmentStringsA
GetEnvironmentStrings
IsBadCodePtr
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetSystemDefaultLangID
GetStdHandle
user32
IsDlgButtonChecked
CheckDlgButton
GetWindowTextW
EnableWindow
SendDlgItemMessageW
SetWindowLongW
FlashWindow
SetForegroundWindow
FindWindowW
IsWindowVisible
GetParent
SendNotifyMessageW
LoadStringW
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
LoadImageW
DestroyIcon
RegisterClassExW
LoadCursorW
LoadIconW
ShowWindow
CreateWindowExW
DispatchMessageW
TranslateMessage
GetMessageW
PostThreadMessageW
RegisterWindowMessageW
GetDesktopWindow
MessageBoxW
GetWindowLongW
DialogBoxIndirectParamW
DialogBoxParamW
EndDialog
SetTimer
SetWindowTextW
PostMessageW
KillTimer
SendMessageW
GetDlgItem
SetDlgItemTextW
advapi32
RegQueryValueExW
RegCloseKey
GetNamedSecurityInfoW
RegCreateKeyExW
AllocateAndInitializeSid
SetNamedSecurityInfoW
SetEntriesInAclW
shell32
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHBrowseForFolderW
SHGetPathFromIDListW
urlmon
URLDownloadToFileA
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE