Static task
static1
Behavioral task
behavioral1
Sample
07b40b4b2bdb9f52dec8e9807b388a15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07b40b4b2bdb9f52dec8e9807b388a15.exe
Resource
win10v2004-20231215-en
General
-
Target
07b40b4b2bdb9f52dec8e9807b388a15
-
Size
244KB
-
MD5
07b40b4b2bdb9f52dec8e9807b388a15
-
SHA1
9dedd2ec6d0c77b028a2ca36cbd4372ce1e07cd7
-
SHA256
3fcf1f1003f9909982d54d03f26cf2464d74a4f11c8ee6c01ba74b0794346c9a
-
SHA512
0c4fe848705b954d09798f4fbb3112b654a3279e4d583c339457740591e1c4b6e2d115a8975e047eae27d15b5c95f9eae69909d746e31b63ed3a882cce91cce1
-
SSDEEP
6144:3eOGyNwqDDVoN68ld3PCQ739mhbTQG0yE2OT3:YqDDYUQqbkiE2C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07b40b4b2bdb9f52dec8e9807b388a15
Files
-
07b40b4b2bdb9f52dec8e9807b388a15.exe windows:4 windows x86 arch:x86
717ca6521410797dbb5d6fd646e6f9a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
RtlUnwind
VirtualAlloc
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetSystemTimeAsFileTime
RaiseException
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
GlobalFlags
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
lstrcmpA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
GlobalGetAtomNameA
GetCurrentProcess
GetThreadLocale
FlushFileBuffers
SetFilePointer
DeleteFileA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
LoadResource
LockResource
SizeofResource
FindResourceA
CreateToolhelp32Snapshot
Process32First
CloseHandle
Process32Next
GetVersionExA
SetLastError
GetComputerNameA
OpenMutexA
GetFileSize
ReadFile
CreateFileA
WriteFile
CreateProcessA
Sleep
lstrcpyA
lstrcatA
GetCurrentThread
CopyFileA
GetTickCount
GetModuleFileNameA
GetTempPathA
LoadLibraryW
GetLastError
lstrlenA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
InterlockedExchange
GetVersion
WaitForSingleObject
FreeLibrary
LoadLibraryA
TerminateProcess
GetProcAddress
user32
PostQuitMessage
DestroyMenu
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowLongA
IsWindow
SetWindowPos
EnumWindows
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
RegisterWindowMessageA
SendMessageTimeoutA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
gdi32
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ