Static task
static1
Behavioral task
behavioral1
Sample
7a0828ef9a01eed928f660c12d19ee1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a0828ef9a01eed928f660c12d19ee1d.exe
Resource
win10v2004-20231215-en
General
-
Target
7a0828ef9a01eed928f660c12d19ee1d
-
Size
130KB
-
MD5
7a0828ef9a01eed928f660c12d19ee1d
-
SHA1
e26059a95323ef24603eb489be940cf0bbffd89f
-
SHA256
f00ba7563117846536b13a9cd574a84c6d93f4af6fa4b6304770cc173c2033aa
-
SHA512
d76904ebe43b1a2c57612278e3e430712019beeb08921504c10c8e8d9c66aec9ad8e92af4f24fbeef0cea7f89645b7c80a5aea4195fc6b2f0a2144755c90d122
-
SSDEEP
3072:9cjgmZ0WJydUkm8jbXR8Am7+HkOVXB63ggc58G88ycm:9cjwpm8jTaAm7+jXBSxm8Ge
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a0828ef9a01eed928f660c12d19ee1d
Files
-
7a0828ef9a01eed928f660c12d19ee1d.exe windows:5 windows x86 arch:x86
4f484e287b6fb184fd6d33e779cceb7f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PostThreadMessageA
GetMenuItemRect
DialogBoxParamW
PeekMessageA
SetWindowPlacement
GetScrollPos
DialogBoxParamA
ToAscii
ClipCursor
DdeFreeStringHandle
IsRectEmpty
RealChildWindowFromPoint
GetWindowLongA
SetPropA
DdeDisconnect
GetClientRect
SetMenuInfo
CreateIconIndirect
EndDeferWindowPos
GetKeyboardLayoutNameA
CreateWindowStationA
ChildWindowFromPointEx
BroadcastSystemMessage
SetShellWindow
GetPriorityClipboardFormat
SendMessageTimeoutW
GetWindowTextLengthW
InvalidateRgn
TileWindows
MessageBoxIndirectW
CharLowerA
EnumDisplaySettingsA
VkKeyScanA
ScrollWindowEx
GetInputDesktop
GetThreadDesktop
ReuseDDElParam
SetClipboardViewer
CloseWindow
WaitMessage
DrawFrameControl
GetCaretPos
CharToOemA
SetThreadDesktop
GetMenuState
DdeGetData
InSendMessage
LoadMenuIndirectA
GetPropA
DdeClientTransaction
CallMsgFilter
DrawIcon
ModifyMenuW
SendDlgItemMessageW
SetMessageQueue
CharLowerBuffA
InvertRect
DdeCmpStringHandles
UnregisterDeviceNotification
GetMenuCheckMarkDimensions
TranslateMDISysAccel
CallWindowProcW
SetUserObjectInformationA
GetClassInfoW
SetPropW
DlgDirSelectComboBoxExW
SetCaretBlinkTime
CharPrevExA
MonitorFromWindow
TranslateAcceleratorA
GetWindowContextHelpId
IsCharUpperA
EnumDisplaySettingsW
DispatchMessageW
GetMenuContextHelpId
GetMenuItemInfoW
ChangeDisplaySettingsExW
GetParent
GetComboBoxInfo
GetWindowPlacement
GetTabbedTextExtentA
GetDlgCtrlID
SendIMEMessageExW
CreateIconFromResource
CreatePopupMenu
MsgWaitForMultipleObjects
PostThreadMessageW
OemToCharA
SendNotifyMessageA
DdeQueryStringW
GetWindowTextA
RegisterClassExW
GetWindowRgn
CreateWindowExW
CopyIcon
GetUpdateRect
InternalGetWindowText
MapVirtualKeyExA
SetScrollInfo
DdeCreateStringHandleW
DefWindowProcA
GetQueueStatus
ExitWindowsEx
GetWindowThreadProcessId
EnumWindows
GetWindowRect
GetMenuStringA
MessageBeep
FindWindowExA
LoadBitmapW
IsZoomed
DdeReconnect
InsertMenuW
CharUpperW
CreateDialogParamW
GetTopWindow
GetClassNameA
SetCapture
DdeConnectList
SubtractRect
FindWindowW
ScrollDC
GetClipboardViewer
CheckDlgButton
ShowWindowAsync
IsIconic
GetKeyboardType
DdeKeepStringHandle
DestroyIcon
DdeAbandonTransaction
SetRectEmpty
GetSubMenu
IsDialogMessage
SendMessageCallbackA
LoadCursorFromFileA
DdeAddData
CreateMenu
DdeNameService
DefFrameProcW
MenuItemFromPoint
SendMessageTimeoutA
CreateDialogParamA
GetActiveWindow
WINNLSGetEnableStatus
DragDetect
DlgDirSelectExW
GetWindow
DestroyCursor
FlashWindowEx
OffsetRect
WaitForInputIdle
AppendMenuA
SetMenuItemBitmaps
GetMenuBarInfo
UnregisterHotKey
GetGUIThreadInfo
LoadIconW
ToUnicode
TrackMouseEvent
SetScrollPos
SetClassLongW
EnumWindowStationsA
GetMenuItemInfoA
EndPaint
CopyImage
RegisterDeviceNotificationW
SetWindowTextA
GetFocus
ShowWindow
CharUpperBuffA
GetDlgItemTextW
GetMonitorInfoA
DdeUninitialize
MapVirtualKeyA
TranslateAcceleratorW
SetRect
FlashWindow
SetScrollRange
SetWindowRgn
EditWndProc
DestroyMenu
GetClipboardSequenceNumber
ToAsciiEx
LookupIconIdFromDirectory
EnumPropsExA
VkKeyScanExA
GetListBoxInfo
ole32
IsAccelerator
OleCreateLinkEx
ProgIDFromCLSID
CoRegisterChannelHook
CoGetClassObject
CoRegisterClassObject
PropVariantClear
kernel32
VirtualAlloc
LockFileEx
FindNextChangeNotification
GetConsoleTitleA
lstrcmpW
GetProfileIntA
WriteFileEx
TransactNamedPipe
ReadFileEx
SetComputerNameW
SetProcessWorkingSetSize
QueryPerformanceCounter
DisableThreadLibraryCalls
SetLocaleInfoA
SizeofResource
GetCurrencyFormatW
GetPrivateProfileSectionNamesA
VirtualProtect
LocalLock
GetDateFormatW
FatalAppExitW
lstrcmp
GetProcAddress
WriteConsoleA
GetNamedPipeHandleStateA
CompareStringA
CreateSemaphoreW
CreateConsoleScreenBuffer
Thread32Next
SetThreadPriorityBoost
lstrlenA
VirtualQuery
GetPrivateProfileStructA
IsBadWritePtr
WriteConsoleOutputCharacterA
PeekConsoleInputA
CreateToolhelp32Snapshot
GetNamedPipeHandleStateW
SetConsoleTitleW
WriteFile
FreeConsole
GetPrivateProfileIntW
SetStdHandle
SleepEx
IsProcessorFeaturePresent
CreateProcessA
IsBadCodePtr
SetThreadExecutionState
ConvertThreadToFiber
EnumSystemCodePagesA
BackupRead
LoadLibraryA
GlobalAddAtomA
EnumCalendarInfoW
GetStringTypeExW
GetModuleFileNameA
SetConsoleActiveScreenBuffer
QueryDosDeviceA
SetFileAttributesW
FreeLibrary
QueryDosDeviceW
LockResource
GetPrivateProfileStructW
QueueUserAPC
GetNumberFormatW
GlobalDeleteAtom
VirtualFree
OpenMutexW
GetVolumeInformationW
RemoveDirectoryA
CreateEventA
LocalReAlloc
EnumSystemCodePagesW
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetCurrentThreadId
GetModuleFileNameW
GetProcessAffinityMask
lstrcpyn
ReadFile
SwitchToFiber
CreateDirectoryExA
VirtualFreeEx
ReadConsoleInputW
GetFileTime
GetSystemTimeAdjustment
CreateFileMappingW
TlsAlloc
OpenFile
BackupSeek
GetComputerNameW
SetSystemTime
WritePrivateProfileStringW
ScrollConsoleScreenBufferW
ReadConsoleA
SetLocalTime
IsBadHugeWritePtr
IsValidLocale
SetCalendarInfoA
QueryPerformanceFrequency
CopyFileExW
WinExec
CompareStringW
GetDriveTypeW
GetExitCodeProcess
SetConsoleOutputCP
VerLanguageNameA
GetLocaleInfoA
ReadConsoleOutputAttribute
HeapValidate
GetVersionExA
CreateFileMappingA
GetCurrentProcessId
WaitNamedPipeA
SetWaitableTimer
GetBinaryType
ReadConsoleOutputW
GetCompressedFileSizeA
CreateDirectoryA
GetProcessShutdownParameters
EnumDateFormatsExW
SetUnhandledExceptionFilter
PeekConsoleInputW
SetThreadContext
HeapCompact
GetFileAttributesW
ReleaseSemaphore
GetEnvironmentStrings
OpenSemaphoreA
GetCurrentProcess
Heap32First
FindNextFileW
LocalFileTimeToFileTime
OpenFileMappingW
CreateMutexA
LoadLibraryExA
CancelWaitableTimer
GetLongPathNameA
OpenFileMappingA
GetTempFileNameA
GetLogicalDriveStringsW
UpdateResourceW
GetPrivateProfileIntA
LocalHandle
OpenSemaphoreW
shlwapi
PathFindNextComponentA
StrRetToBufA
SHAutoComplete
SHDeleteValueW
StrFromTimeIntervalA
StrCpyW
StrRetToStrW
PathIsSystemFolderA
advapi32
CryptDuplicateHash
OpenEventLogA
InitiateSystemShutdownW
StartServiceCtrlDispatcherA
CryptReleaseContext
RegCreateKeyA
RegCreateKeyExA
CloseEventLog
GetAuditedPermissionsFromAclW
GetMultipleTrusteeW
RegDeleteValueW
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ