Static task
static1
Behavioral task
behavioral1
Sample
7ec0064f04267ab106615c6e061b7f637d506790ad638341d7511591ad7cbd57.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ec0064f04267ab106615c6e061b7f637d506790ad638341d7511591ad7cbd57.exe
Resource
win10v2004-20231222-en
General
-
Target
7ec0064f04267ab106615c6e061b7f637d506790ad638341d7511591ad7cbd57
-
Size
1.6MB
-
MD5
50e3ff093bdafe3d791ebbec0c709d35
-
SHA1
23899d2148720f66f993fc326e83100b2b4c10a9
-
SHA256
7ec0064f04267ab106615c6e061b7f637d506790ad638341d7511591ad7cbd57
-
SHA512
ed9553f39a20f5247825a1ec875fafecf56d5f973747f3607e11d3237dc542f25812e5c28230ff926c4ae7115350ab9ce206cf363c7c406750549269ba89f15b
-
SSDEEP
24576:YU1VBlsGEID59q+W2kcjh0YboGdBqSS228Bo+WJl5e1iIjjyHFniIjjyHFk6:hl962l0YbNBqSS22v+gl5e17j27jG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ec0064f04267ab106615c6e061b7f637d506790ad638341d7511591ad7cbd57
Files
-
7ec0064f04267ab106615c6e061b7f637d506790ad638341d7511591ad7cbd57.exe windows:6 windows x86 arch:x86
ac088a634b3ee630a56d0b8218a01145
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
SetUnhandledExceptionFilter
IsBadReadPtr
GetModuleHandleW
GetCurrentProcessId
GetProcAddress
lstrlenW
lstrcpynW
GetProcessId
GetVersionExW
Sleep
OutputDebugStringW
GetCurrentThread
LoadLibraryW
CreateProcessW
FreeLibrary
WideCharToMultiByte
AddAtomW
GetCurrentThreadId
FindAtomW
VirtualProtect
GetModuleFileNameW
GetPrivateProfileIntW
WritePrivateProfileStringW
lstrcmpiW
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
FindResourceW
LoadResource
FindResourceExW
RaiseException
CloseHandle
HeapReAlloc
LockResource
GetLastError
DeleteFileW
FindClose
DeleteAtom
FindNextFileW
FindFirstFileW
CopyFileW
TerminateThread
GetProcessTimes
GetTickCount
SystemTimeToFileTime
Process32FirstW
Process32NextW
GetPrivateProfileStringW
CreateToolhelp32Snapshot
OpenProcess
ConnectNamedPipe
GetOverlappedResult
DisconnectNamedPipe
CreateFileW
WaitForMultipleObjects
CreateNamedPipeW
WriteFile
SetNamedPipeHandleState
ReadFile
ResetEvent
SetEvent
CreateEventW
WriteConsoleW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
ReadConsoleW
SetStdHandle
WaitForSingleObject
ReleaseMutex
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetStdHandle
MultiByteToWideChar
HeapSize
InitializeCriticalSectionEx
CreateMutexW
InitializeCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
EnterCriticalSection
HeapFree
SizeofResource
IsDebuggerPresent
GetStringTypeW
WaitForSingleObjectEx
SwitchToThread
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
EncodePointer
QueryPerformanceCounter
QueryPerformanceFrequency
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
lstrcpyW
MulDiv
GetACP
ExitProcess
FreeResource
GetFileSize
lstrcmpW
SetEndOfFile
SetFilePointer
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetVersion
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
GetTempFileNameW
GetTempPathW
ResumeThread
GetLocalTime
IsProcessorFeaturePresent
UnhandledExceptionFilter
InitializeSListHead
LocalFree
GetSystemWindowsDirectoryW
LoadLibraryExW
DeviceIoControl
lstrcmpA
FlushFileBuffers
CreateThread
GetThreadTimes
FreeLibraryAndExitThread
RtlUnwind
GetFileAttributesExW
GetTimeZoneInformation
GetConsoleOutputCP
GetConsoleMode
GetFileType
SetFilePointerEx
ExitThread
GetModuleHandleExW
user32
SetCaretPos
ScreenToClient
MapWindowPoints
IntersectRect
UnionRect
IsRectEmpty
SetWindowLongW
GetParent
GetClassNameW
MonitorFromWindow
DefWindowProcW
CallWindowProcW
RegisterClassW
RegisterClassExW
GetClassInfoExW
ShowWindow
EnableWindow
SetPropW
GetPropW
LoadCursorW
LoadImageW
wvsprintfW
SetCursor
InflateRect
OffsetRect
IsIconic
SetWindowRgn
MessageBoxW
GetCaretBlinkTime
DrawTextW
SetRect
DrawIconEx
GetIconInfo
GetMessagePos
GetDlgCtrlID
DrawFocusRect
FillRect
HideCaret
ShowCaret
ClientToScreen
GetSysColor
InvalidateRect
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
CreateAcceleratorTableW
InvalidateRgn
RemovePropW
FindWindowExW
IsWindowEnabled
CreateCaret
GetUpdateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
KillTimer
ReleaseCapture
SetCapture
GetKeyState
GetFocus
CharNextW
IsZoomed
IsWindowVisible
UpdateLayeredWindow
CharPrevW
GetClientRect
FindWindowW
IsWindow
SendMessageTimeoutW
DestroyWindow
IsChild
CreateWindowExW
SendMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetCursorPos
DestroyIcon
PostMessageW
SetTimer
LoadIconW
RegisterWindowMessageW
wsprintfW
GetWindow
GetWindowLongW
GetWindowRect
SetWindowPos
GetMonitorInfoW
PtInRect
MoveWindow
SetFocus
GetWindowDC
advapi32
RegEnumKeyExW
RegCreateKeyExW
RegSetValueExW
RegCreateKeyW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
QueryServiceStatus
EqualSid
CloseServiceHandle
OpenSCManagerW
AllocateAndInitializeSid
OpenProcessToken
FreeSid
RegOpenKeyExW
OpenServiceW
OpenThreadToken
RegQueryValueExW
GetTokenInformation
shell32
SHFileOperationW
ord680
ShellExecuteExW
ord165
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHCreateDirectoryExW
ole32
CLSIDFromString
CoCreateGuid
CLSIDFromProgID
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
OleLockRunning
oleaut32
SafeArrayCreate
VariantInit
SysFreeString
SysAllocString
SysAllocStringLen
VariantChangeType
VariantClear
SysStringLen
SafeArrayPutElement
shlwapi
SHAutoComplete
StrCmpNIW
StrTrimA
StrStrIA
PathFindFileNameW
PathCombineW
StrStrIW
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
wnsprintfW
StrCpyW
StrCmpIW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
secur32
GetUserNameExW
wininet
InternetGetConnectedState
iphlpapi
GetAdaptersInfo
urlmon
URLDownloadToCacheFileW
URLDownloadToFileW
msimg32
AlphaBlend
GradientFill
comctl32
ord17
_TrackMouseEvent
ImageList_DrawEx
ImageList_GetIconSize
InitCommonControlsEx
gdi32
GetClipBox
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
CreatePen
DeleteDC
DeleteObject
GetStockObject
Rectangle
RestoreDC
SaveDC
SelectObject
GetTextMetricsW
GetObjectW
SetWindowOrgEx
GetDeviceCaps
CreateRoundRectRgn
CombineRgn
CreateRectRgnIndirect
GetCharABCWidthsW
CreateDCW
GetTextExtentPoint32W
SelectClipRgn
ExtSelectClipRgn
SetBkColor
SetBkMode
StretchBlt
SetStretchBltMode
SetDIBitsToDevice
SetTextColor
CreateDIBSection
SetDIBColorTable
TextOutW
ExtTextOutW
CreateSolidBrush
GetTextColor
GetDIBits
gdiplus
GdipAddPathArc
GdipDrawEllipseI
GdipDrawImageRectI
GdipGetImageEncoders
GdipLoadImageFromFile
GdipGetImagePixelFormat
GdipGetPropertyItemSize
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdipImageGetFrameDimensionsCount
GdipGetPropertyItem
GdipLoadImageFromStreamICM
GdipAlloc
GdipFree
GdipCreatePath
GdipDeletePath
GdipAddPathLineI
GdipAddPathArcI
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipSetPenMode
GdipSetPenDashStyle
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawRectangleI
GdipDrawPath
GdipFillEllipseI
GdipClosePathFigure
GdipCreateTexture
GdipCloneImage
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageGraphicsContext
GdipGetImageWidth
GdipGetImageHeight
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipCreateBitmapFromScan0
GdipCreateHBITMAPFromBitmap
GdipCloneBitmapAreaI
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipSetInterpolationMode
GdipGraphicsClear
GdipFillPath
GdipDrawImagePointsI
GdipDrawImageRectRectI
GdipGetImageEncodersSize
GdipImageSelectActiveFrame
Sections
.text Size: 961KB - Virtual size: 960KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ