Static task
static1
Behavioral task
behavioral1
Sample
7d3a0805c794d8ae2f92bb3a4119e4660f4d22c4b6660ce64c99c9d5b2aad213.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d3a0805c794d8ae2f92bb3a4119e4660f4d22c4b6660ce64c99c9d5b2aad213.exe
Resource
win10v2004-20231215-en
General
-
Target
7d3a0805c794d8ae2f92bb3a4119e4660f4d22c4b6660ce64c99c9d5b2aad213
-
Size
704KB
-
MD5
4db332e64bfce5132b34774830494cf4
-
SHA1
b3c2aa9d1cf2acccfa4ed33a1782670cb14a5c37
-
SHA256
7d3a0805c794d8ae2f92bb3a4119e4660f4d22c4b6660ce64c99c9d5b2aad213
-
SHA512
2ba365d95577e11cbc5acb28c205cda4c5d4563b58116a9048eddec79110ce400e2f1299950e78ee72d3c9ef5bdf56803b38fc9975bbc481bcd430b48e72870c
-
SSDEEP
12288:V1MpN66BE87+hC9lwIBZK0Q5pJLApG1JZ9yiE:4RK1p6pGV9yn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d3a0805c794d8ae2f92bb3a4119e4660f4d22c4b6660ce64c99c9d5b2aad213
Files
-
7d3a0805c794d8ae2f92bb3a4119e4660f4d22c4b6660ce64c99c9d5b2aad213.exe windows:4 windows x86 arch:x86
00e3d416de66474485eac0531cd03d8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegGetValueW
RegOpenKeyW
RegQueryValueExW
RegSetValueExA
RegSetValueExW
gdi32
CreateFontIndirectW
DeleteObject
GetDeviceCaps
GetTextExtentPointA
GetTextExtentPointW
GetTextMetricsW
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DelayLoadFailureHook
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FreeLibrary
GetCommandLineW
GetExitCodeProcess
GetFullPathNameW
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetStartupInfoW
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
IsBadStringPtrA
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
QueryPerformanceFrequency
ReadDirectoryChangesW
ResolveDelayLoadedAPI
TerminateProcess
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiW
ntdll
_vsnprintf
rpcrt4
UuidCreate
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_assert
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsicmp
exit
free
fwrite
getenv
iswspace
malloc
memcmp
memcpy
memmove
realloc
strchr
strcmp
strcpy
strcspn
strlen
wcschr
wcscmp
wcscpy
wcsncmp
wcstoul
user32
AppendMenuW
BeginPaint
ChangeDisplaySettingsExW
ClientToScreen
ClipCursor
CopyIcon
CreateDesktopW
CreateIcon
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawCaptionTempW
DrawFrameControl
DrawIconEx
DrawTextW
EndPaint
EnumDisplayDevicesW
EnumDisplaySettingsExW
ExitWindowsEx
GetAncestor
GetClientRect
GetDC
GetDesktopWindow
GetForegroundWindow
GetMenuInfo
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindow
GetWindowLongW
GetWindowRect
GetWindowThreadProcessId
InsertMenuItemW
IntersectRect
InvalidateRect
IsIconic
IsWindowEnabled
IsWindowVisible
KillTimer
LoadCursorA
LoadCursorW
LoadIconW
LoadStringW
MapWindowPoints
PaintDesktop
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
SendMessageW
SendNotifyMessageW
SetCursor
SetForegroundWindow
SetMenuInfo
SetMenuItemInfoW
SetThreadDesktop
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SubtractRect
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
UnregisterClassW
UpdateWindow
win32u
NtUserMessageCall
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/14 Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/29 Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/41 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/55 Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/67 Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/78 Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/89 Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ