Static task
static1
Behavioral task
behavioral1
Sample
c7ad090909fab8132333a73f2723d780_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c7ad090909fab8132333a73f2723d780_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
c7ad090909fab8132333a73f2723d780_exe32.exe
-
Size
1.2MB
-
MD5
c7ad090909fab8132333a73f2723d780
-
SHA1
79bf61c03ccbb9f358153d8c679d40835436b4d5
-
SHA256
7c32fef907d3715e4dda076ab7662020d12d5f3f1c9cc13e245136122ba297ed
-
SHA512
7bc2566ae3afb1ed1d221f0a91b271afb841b9b931eadd2480b2bff5357e5f2730a4900d9b2059261d15bc439f912bacceacc18c47b80c9c169fe28c67471a64
-
SSDEEP
24576:6pHrAgaGWfw2BKu7xYN0eF9IGrtALGp8YuqPkQR9bQ+uf:6p1/wwxu7x169dtALGpuqPkQPzi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7ad090909fab8132333a73f2723d780_exe32.exe
Files
-
c7ad090909fab8132333a73f2723d780_exe32.exe.exe windows:5 windows x86
c5a647f774e5c2e1f7b5a4ab9784568e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
vslg
?NDCpop@@YAXXZ
?NDCpush@@YAXPAD@Z
?Log4cxxConfig@@YAXPAD@Z
?VSLog@@YAXPADHPBDZZ
msacm32
acmMetrics
acmDriverClose
acmFormatEnumA
acmDriverOpen
acmDriverDetailsA
acmStreamClose
acmStreamUnprepareHeader
acmStreamPrepareHeader
acmStreamOpen
acmFormatSuggest
acmStreamConvert
acmDriverEnum
winmm
mmioSetInfo
mmioAdvance
mmioGetInfo
mmioCreateChunk
mmioRead
mmioWrite
mmioOpenA
mmioSeek
mmioDescend
mmioClose
mmioAscend
kernel32
IsValidCodePage
GetACP
VirtualFree
HeapCreate
IsDebuggerPresent
TerminateProcess
GetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
ExitProcess
HeapSize
GetFileType
SetStdHandle
CreateThread
ExitThread
GetStartupInfoA
GetDateFormatA
GetTimeFormatA
CreateDirectoryA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
RtlUnwind
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GetLocaleInfoA
InterlockedExchange
GlobalFlags
GetFileTime
GetFileSizeEx
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
TlsFree
LocalReAlloc
GlobalReAlloc
CompareStringA
GlobalGetAtomNameA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
GetTimeZoneInformation
SetFilePointer
MoveFileA
GetModuleFileNameW
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
FormatMessageA
IsProcessorFeaturePresent
InterlockedCompareExchange
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetDriveTypeA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
lstrlenW
GetModuleHandleA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
GetLastError
RaiseException
LeaveCriticalSection
WideCharToMultiByte
EnterCriticalSection
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
HeapSetInformation
GetProcessHeap
GetCurrentThreadId
GetCommandLineA
CloseHandle
GetCurrentProcess
GetCurrentThread
GetProcAddress
GetModuleHandleW
GlobalUnlock
GlobalLock
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
CreateSemaphoreA
WaitForSingleObject
ReleaseSemaphore
OpenSemaphoreA
SearchPathA
HeapReAlloc
HeapFree
HeapAlloc
GetVersion
GetFileSize
GetLocalTime
SetErrorMode
GetEnvironmentVariableA
GetCurrentProcessId
GetSystemTime
SystemTimeToFileTime
TlsAlloc
TlsGetValue
TlsSetValue
LocalAlloc
LocalFree
DeviceIoControl
WriteFile
ReadFile
WaitNamedPipeA
CreateFileA
CopyFileA
GetFileAttributesExA
LoadLibraryA
GetDiskFreeSpaceExA
DeleteFileA
GetFileAttributesA
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
FindNextFileA
FindClose
CompareFileTime
Beep
Sleep
GlobalHandle
GlobalFree
SetLastError
FlushInstructionCache
MulDiv
lstrcmpA
LockResource
GlobalAlloc
FlushFileBuffers
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
GetMessageA
DispatchMessageA
DestroyWindow
PostThreadMessageA
CharNextA
ShowWindow
CharNextW
LoadStringA
MessageBoxA
SetWindowPos
SetWindowContextHelpId
MapDialogRect
GetWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
DefWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowTextA
GetWindowTextA
GetWindowTextLengthA
DestroyAcceleratorTable
GetSysColor
IsChild
GetFocus
SetFocus
CallWindowProcA
EndPaint
FillRect
GetClientRect
BeginPaint
IsWindow
RedrawWindow
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
GetMenu
SystemParametersInfoA
GetClassNameA
GetParent
GetDesktopWindow
ReleaseDC
GetDC
CreateAcceleratorTableA
MoveWindow
ScreenToClient
ClientToScreen
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
SendMessageA
GetDlgItem
CreateDialogIndirectParamA
PostQuitMessage
PostMessageA
PeekMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
IsIconic
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
GetSysColorBrush
EnableWindow
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
CharUpperA
GetSystemMetrics
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
TranslateMessage
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
gdi32
PtVisible
SetMapMode
RectVisible
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetStockObject
GetObjectA
GetDeviceCaps
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
ExtTextOutA
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
EnumPrintersA
advapi32
StartServiceA
RegCreateKeyA
RegOpenKeyA
StartServiceCtrlDispatcherA
ControlService
DeleteService
CreateServiceA
RegQueryValueExA
GetTokenInformation
OpenThreadToken
OpenProcessToken
SetSecurityDescriptorGroup
IsValidSid
GetLengthSid
CopySid
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
shell32
ShellExecuteA
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
ole32
CoInitialize
CoRevokeClassObject
CoRegisterClassObject
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
StringFromGUID2
CoCreateInstance
CreateStreamOnHGlobal
OleUninitialize
OleInitialize
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleLockRunning
oleaut32
SysAllocString
LoadTypeLi
UnRegisterTypeLi
SysAllocStringLen
LoadRegTypeLi
OleCreateFontIndirect
SysStringLen
RegisterTypeLi
VarUI4FromStr
VariantChangeType
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayCreateVector
VariantInit
SafeArrayDestroy
VariantCopy
VariantClear
SysFreeString
wsock32
gethostname
gethostbyname
WSAGetLastError
select
getpeername
recv
send
WSAAsyncSelect
recvfrom
sendto
connect
WSASetLastError
bind
ioctlsocket
htons
htonl
socket
accept
closesocket
WSACleanup
WSAStartup
listen
Sections
.text Size: 929KB - Virtual size: 928KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CONST Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ