Static task
static1
Behavioral task
behavioral1
Sample
7f36ed0a205a5c89d9ae5b6cf978a566ebedf8a77726b06c50ce8bd559b1cc99.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
7f36ed0a205a5c89d9ae5b6cf978a566ebedf8a77726b06c50ce8bd559b1cc99.exe
Resource
win10v2004-20231023-en
General
-
Target
7f36ed0a205a5c89d9ae5b6cf978a566ebedf8a77726b06c50ce8bd559b1cc99
-
Size
3.4MB
-
MD5
9abf516567f458f4ff332cc1c1563b2c
-
SHA1
c64429f8f30fb8b110e39e2dc54bcb9cc992076a
-
SHA256
7f36ed0a205a5c89d9ae5b6cf978a566ebedf8a77726b06c50ce8bd559b1cc99
-
SHA512
2e9ec7f830f23118de13ef6c468cae68a1987f36dc07957c450fca014b1e22eba4c1504adbad2f3e4bc127f7e4fc594fe4a331fad0d30bacb2938c01ce30cd77
-
SSDEEP
49152:ZDN2yoIj9FY8uet2yBqS/+xn3mnty0hE+UaRt0ipEGt+4+ac:ZYy4wL+xQi+UaRt1po4+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f36ed0a205a5c89d9ae5b6cf978a566ebedf8a77726b06c50ce8bd559b1cc99
Files
-
7f36ed0a205a5c89d9ae5b6cf978a566ebedf8a77726b06c50ce8bd559b1cc99.exe windows:6 windows x86
0ea632e15726084bee0ae57e75d4af09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
ReadFile
RemoveDirectoryW
CloseHandle
GetLastError
SetLastError
CreatePipe
PeekNamedPipe
WaitForSingleObject
GetCurrentProcess
GetCurrentProcessId
TerminateProcess
GetExitCodeProcess
CreateProcessW
OpenProcess
GetSystemInfo
GetSystemDirectoryW
GetVersionExW
VirtualQuery
GetModuleFileNameW
GetModuleHandleW
GlobalFlags
LocalFree
FormatMessageW
CopyFileW
IsBadReadPtr
IsBadWritePtr
SetSystemPowerState
MultiByteToWideChar
WideCharToMultiByte
GenerateConsoleCtrlEvent
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetQueuedCompletionStatus
SetEvent
ResetEvent
CreateEventW
Sleep
CreateThread
SetThreadPriority
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetLocalTime
SetLocalTime
FileTimeToSystemTime
VirtualAlloc
VirtualProtect
VirtualFree
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
FindClose
CreateFileW
FlushFileBuffers
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
HeapQueryInformation
HeapSize
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
DecodePointer
GetFileSizeEx
GetConsoleCP
SetFilePointerEx
ReadConsoleW
GetConsoleMode
GetCurrentThread
SetConsoleCtrlHandler
WriteFile
HeapValidate
GetCommandLineA
WriteConsoleW
GetModuleHandleExW
GetFileType
GetStdHandle
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
InterlockedFlushSList
InterlockedPushEntrySList
LoadLibraryExW
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
InitializeCriticalSectionAndSpinCount
DeleteFileW
CreateDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
IsBadStringPtrA
GetCommandLineW
GetUserDefaultLCID
LoadLibraryW
GetProcAddress
FreeLibrary
FindResourceW
SizeofResource
LockResource
LoadResource
FreeResource
GetTickCount
GetCurrentThreadId
ExitProcess
DebugBreak
MulDiv
GlobalFree
GlobalLock
FindFirstFileW
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalAlloc
LeaveCriticalSection
OutputDebugStringW
IsDebuggerPresent
IsBadStringPtrW
DeleteCriticalSection
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
LoadLibraryA
SetEndOfFile
user32
SetPropW
GetPropW
RemovePropW
CallWindowProcW
CallWindowProcA
ShowScrollBar
GetWindowRect
UnhookWindowsHookEx
GetMessageW
TranslateMessage
DispatchMessageW
MessageBoxW
GetSystemMetrics
GetDC
GetWindowDC
ReleaseDC
GetClientRect
LoadStringW
SendMessageW
PostMessageW
DefWindowProcW
RegisterClassW
GetClassInfoW
CreateWindowExW
GetClassNameW
DestroyWindow
GetActiveWindow
SetTimer
GetWindowLongW
GetDesktopWindow
SetWindowLongW
GetParent
LoadCursorW
LoadIconW
wsprintfW
GetKeyState
GetMonitorInfoW
MonitorFromWindow
EnumDisplaySettingsW
GetWindowThreadProcessId
EnumWindows
SetForegroundWindow
SetActiveWindow
EmptyClipboard
GetClipboardData
SetClipboardData
CloseClipboard
OpenClipboard
MoveWindow
WaitForInputIdle
AttachThreadInput
ExitWindowsEx
CopyImage
LoadImageW
gdi32
CreateFontIndirectW
GetObjectW
SetDIBColorTable
GetTextExtentPoint32W
GdiAlphaBlend
SetStretchBltMode
StretchBlt
SelectPalette
SelectObject
RealizePalette
GetSystemPaletteEntries
GetStockObject
GetDIBits
GetDeviceCaps
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
CreateDIBSection
CreatePalette
advapi32
RegQueryValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegCloseKey
RegSetValueExW
RegQueryValueExW
OpenProcessToken
RegOpenKeyExW
RegCreateKeyExW
shell32
DragAcceptFiles
ShellExecuteW
ole32
CoUninitialize
OleRun
CLSIDFromProgID
IIDFromString
CLSIDFromString
CoCreateInstance
CoInitializeEx
CreateStreamOnHGlobal
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VarUdateFromDate
OleCreatePictureIndirect
OleCreateFontIndirect
GetActiveObject
RegisterTypeLi
SysAllocString
SysFreeString
SysStringLen
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
SafeArrayUnaccessData
VariantInit
VariantClear
VariantCopy
VariantCopyInd
VariantChangeType
VarCmp
LHashValOfNameSys
LoadTypeLi
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
gdiplus
GdipSetCompositingMode
GdipDeleteGraphics
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromFile
GdipCreateBitmapFromStream
GdipDrawImageRectI
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusShutdown
GdiplusStartup
GdipFree
GdipAlloc
GdipGetImagePaletteSize
GdipCreateBitmapFromScan0
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ