?DllGetVersion@@YAHPAU_DllVersionInfo@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
7e504d5ae733f30cddccb2eb0598d07f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e504d5ae733f30cddccb2eb0598d07f.exe
Resource
win10v2004-20231215-en
General
-
Target
7e504d5ae733f30cddccb2eb0598d07f
-
Size
1021KB
-
MD5
7e504d5ae733f30cddccb2eb0598d07f
-
SHA1
37a92d16fdb03157e3071b4b3c0a82ed992a781e
-
SHA256
1b3a7025837a78131ebd2cdce1be4cb759812aa6774682302ddf4fd0ef94413e
-
SHA512
1db59d8f95a34b94c9b3281d8b2c1a38f2d0d8a53b2d912d129d4adeda6ca9ed9b36b1f37b41a0fcdf3a8a5281646f7a7c894f929ebce76aaf3bedefc9a6d345
-
SSDEEP
24576:JHf2mzw4xqc4R0yZ0DokuypQStht1mRLZjb0wt:R/8ZZ0UkuwJ0+e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e504d5ae733f30cddccb2eb0598d07f
Files
-
7e504d5ae733f30cddccb2eb0598d07f.exe windows:4 windows x86 arch:x86
cf0baa24cc021ca2a96e17c12a9efb48
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
connect
WSAStartup
WSAGetLastError
htons
WSACleanup
recv
socket
gethostbyname
send
kernel32
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FindResourceA
GetLocaleInfoA
LoadResource
GlobalLock
WaitForSingleObject
GetCommandLineA
FindResourceExA
GlobalAlloc
WideCharToMultiByte
SizeofResource
CreateProcessA
GetModuleFileNameW
CompareStringW
GetACP
MultiByteToWideChar
RaiseException
InterlockedExchange
GetThreadLocale
LockResource
CompareStringA
GetVersionExA
GetLastError
SetEnvironmentVariableA
GlobalReAlloc
CreateThread
SetEndOfFile
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
FlushFileBuffers
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
SetFilePointer
GetStdHandle
SetHandleCount
WriteFile
GetCurrentDirectoryA
GetDriveTypeA
ReadFile
CreateFileA
GetFileType
SetStdHandle
GetTimeZoneInformation
VirtualFree
LeaveCriticalSection
Sleep
InitializeCriticalSection
FormatMessageA
GetStringTypeA
CloseHandle
GetStringTypeW
LCMapStringA
LCMapStringW
LoadLibraryA
GetProcessHeap
HeapCreate
HeapDestroy
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
HeapFree
HeapAlloc
HeapSize
DeleteFileA
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateDirectoryA
RemoveDirectoryA
GetTimeFormatA
GetDateFormatA
GetFullPathNameA
GetSystemTimeAsFileTime
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
ResumeThread
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
user32
DestroyWindow
GetMessageA
SetActiveWindow
CreateDialogParamA
DdeCreateStringHandleA
DdeGetLastError
SetForegroundWindow
DdeInitializeA
GetClientRect
GetDC
TranslateMessage
GetWindowTextA
MessageBoxA
BringWindowToTop
PeekMessageA
ReleaseDC
GetDlgItem
SetWindowPos
ShowWindow
DispatchMessageA
DdeClientTransaction
DdeConnect
DdeNameService
SetWindowTextA
GetCursorPos
gdi32
DeleteObject
SelectObject
GetBkColor
CreatePen
CreateSolidBrush
Polygon
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
Exports
Exports
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ