Behavioral task
behavioral1
Sample
7e0c58a01e7e9ec7626a2609e812df9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e0c58a01e7e9ec7626a2609e812df9a.exe
Resource
win10v2004-20231215-en
General
-
Target
7e0c58a01e7e9ec7626a2609e812df9a
-
Size
996KB
-
MD5
7e0c58a01e7e9ec7626a2609e812df9a
-
SHA1
8451a0702d8981355386f371c6e7a6429164ab34
-
SHA256
34b5a7479d1afc2695bb98878918c58b75bea084ce6100b027d7f23bcd76889d
-
SHA512
9f5c2e30bb59a4c810405c399b2f351f80f22dd7bdbc637f304f48016c65aca9c052152e1bf4a9d9fd23ac8fe25cd76721a51acc1d27d8537e33dddfcabae170
-
SSDEEP
24576:w7/NX6pXzwXOqiFPJfrzUcDuhT1SJp14Rvfmwi1iAF:xRzwXO5PJfrzUcDuhT1SJElfmgA
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e0c58a01e7e9ec7626a2609e812df9a
Files
-
7e0c58a01e7e9ec7626a2609e812df9a.exe windows:4 windows x86 arch:x86
8796f11d4ad506543373c19a7c49f493
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
GetFullPathNameA
CreateFileA
FindResourceExA
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
GetCurrentProcess
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetDriveTypeA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FileTimeToSystemTime
GetCPInfo
GlobalFlags
WritePrivateProfileStringA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetThreadLocale
InterlockedIncrement
VirtualProtect
GetCurrentProcessId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcmpW
FreeResource
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameW
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
SetLastError
GetOEMCP
FindFirstFileA
FindClose
GetLocalTime
GetDateFormatA
GetPrivateProfileStringA
IsDBCSLeadByte
GetVolumeInformationA
CreateDirectoryA
GetTempFileNameA
DeleteFileA
lstrcmpA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetTickCount
GetVersionExA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
Sleep
InitializeCriticalSection
DeleteCriticalSection
GetUserDefaultLCID
LoadLibraryA
FreeLibrary
lstrcpyA
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateMutexA
WaitForSingleObject
ReleaseMutex
CloseHandle
lstrlenA
lstrcmpiA
CompareStringW
CompareStringA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
user32
BeginPaint
EndPaint
GetAsyncKeyState
CharNextA
GetSysColorBrush
UnregisterClassA
CopyAcceleratorTableA
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
CreateWindowExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
CopyRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
IntersectRect
SystemParametersInfoA
GetWindowDC
WindowFromPoint
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetNextDlgTabItem
EndDialog
PostQuitMessage
SetWindowsHookExA
CallNextHookEx
GetMessageA
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
SetFocus
ShowWindow
GetDlgItem
ReleaseCapture
TrackMouseEvent
SetCapture
GetSysColor
FillRect
DrawTextA
DrawFocusRect
TrackPopupMenu
DestroyMenu
InsertMenuA
SetWindowPos
RedrawWindow
GetDC
ReleaseDC
GetDesktopWindow
ClientToScreen
OffsetRect
SetWindowRgn
EnumChildWindows
SetCursorPos
GetParent
ScreenToClient
SetRectEmpty
SetRect
RegisterWindowMessageA
GetKeyState
GetSystemMenu
RemoveMenu
GetSystemMetrics
LoadCursorA
SetCursor
GetWindowLongA
IsWindowEnabled
GetActiveWindow
SetActiveWindow
PeekMessageA
DispatchMessageA
TranslateMessage
EnableWindow
GetFocus
InvalidateRect
UpdateWindow
GetClientRect
GetWindowRect
DrawIcon
PtInRect
MessageBoxA
GrayStringA
DrawTextExA
TabbedTextOutA
MoveWindow
IsDialogMessageA
IsDlgButtonChecked
CheckRadioButton
GetWindowPlacement
AppendMenuA
CreatePopupMenu
KillTimer
SetTimer
LoadImageA
LoadStringA
FindWindowExA
GetWindowThreadProcessId
GetCursorPos
DestroyIcon
LoadIconA
IsWindowVisible
LoadMenuA
GetSubMenu
SetMenuDefaultItem
FindWindowA
SendMessageA
PostMessageA
IsIconic
ShowWindowAsync
GetWindow
SetForegroundWindow
BringWindowToTop
CharUpperA
GetClassInfoExA
RegisterClassExA
UnhookWindowsHookEx
gdi32
GetViewportExtEx
CreateBitmap
GetWindowExtEx
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetBkColor
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetRgnBox
EnumFontFamiliesExA
GetClipBox
GetTextExtentPoint32A
SetBkColor
GetTextColor
SetMapMode
RestoreDC
SaveDC
BitBlt
CreateCompatibleDC
GetStockObject
DeleteObject
SetPixel
GetPixel
GetTextMetricsA
SetStretchBltMode
GetCurrentObject
SetTextColor
MoveToEx
LineTo
SetBkMode
PatBlt
Rectangle
CreateSolidBrush
CreatePen
GetDIBits
CombineRgn
ExtCreateRegion
GetDeviceCaps
CreateFontIndirectA
CreateDIBSection
DeleteDC
StretchBlt
CreateCompatibleBitmap
SelectObject
GetObjectA
ExcludeClipRect
ExtTextOutA
comdlg32
GetSaveFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
DoEnvironmentSubstA
ExtractIconExA
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathFileExistsA
PathIsUNCA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
StgCreateDocfileOnILockBytes
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
CreateILockBytesOnHGlobal
CoRevokeClassObject
CoTaskMemAlloc
OleIsCurrentClipboard
oleaut32
SysAllocStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocString
Sections
.text Size: 620KB - Virtual size: 618KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE