?_GetPhysicalCursorPos@@YGPAXPAKPAIG@Z
Static task
static1
Behavioral task
behavioral1
Sample
7dfd6e7fc9e4b6f08d7fc6e4e02d5448.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7dfd6e7fc9e4b6f08d7fc6e4e02d5448.exe
Resource
win10v2004-20231215-en
General
-
Target
7dfd6e7fc9e4b6f08d7fc6e4e02d5448
-
Size
326KB
-
MD5
7dfd6e7fc9e4b6f08d7fc6e4e02d5448
-
SHA1
1ecc4ec7e847710b553fa75d771880b5f68ecf05
-
SHA256
3a075800faa4533c808c1d56f0af4701d1f0dfeb7deca6a17d968421ae871834
-
SHA512
de35c90a719208db2f5bd1082dc8300c7577ec92f2114b93c4fa98adf3b6c263d686c88737eca3ea2c4774ef2063a02de463180aa843475f77db87a66c59d395
-
SSDEEP
6144:mXgtN3jvmecNBQf8HO0HEvCK2WlbZVDdhcBoLFK4+yp3eG4:mXgtN3aecElndjAyLFKIFen
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7dfd6e7fc9e4b6f08d7fc6e4e02d5448
Files
-
7dfd6e7fc9e4b6f08d7fc6e4e02d5448.exe windows:5 windows x86 arch:x86
925d1314099ec18afa9abfc389b5d18a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrPBrkA
StrCatBuffA
ChrCmpIA
PathBuildRootW
ChrCmpIW
ord157
PathFindFileNameW
shell32
SHCreateQueryCancelAutoPlayMoniker
kernel32
GetCommConfig
OpenWaitableTimerW
FindNextFileW
FileTimeToDosDateTime
EscapeCommFunction
SetCommState
GlobalFindAtomA
LoadLibraryExW
CreateJobObjectA
SetStdHandle
CreateFileMappingW
GetCurrentDirectoryA
CloseHandle
GlobalReAlloc
CreateWaitableTimerA
LoadLibraryExA
CreateEventW
lstrcatA
PeekNamedPipe
GetTapePosition
user32
GetMenuCheckMarkDimensions
CreateMenu
GetMenuStringW
CreateDesktopA
DefDlgProcW
HideCaret
SendNotifyMessageW
SetScrollRange
SetPropW
GetKeyboardLayoutNameW
GetUpdateRect
SetWindowContextHelpId
CreateIcon
SystemParametersInfoW
SendMessageCallbackW
CheckDlgButton
SetMenu
UnhookWindowsHookEx
SetWindowTextW
CallWindowProcW
TranslateMDISysAccel
CheckMenuRadioItem
SetCaretPos
gdi32
Polygon
CreateEnhMetaFileA
CreateDiscardableBitmap
GetStretchBltMode
GetEnhMetaFileHeader
SetTextCharacterExtra
GetMetaRgn
GetPaletteEntries
CreateFontIndirectW
SelectClipRgn
FixBrushOrgEx
FlattenPath
advapi32
AddAccessDeniedAce
AddAuditAccessObjectAce
Exports
Exports
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.icode Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MData Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MConst Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.NData Size: 1024B - Virtual size: 756B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 179KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE