Static task
static1
Behavioral task
behavioral1
Sample
7f01a5244dcfb98e8b8c526b71056666.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f01a5244dcfb98e8b8c526b71056666.exe
Resource
win10v2004-20231215-en
General
-
Target
7f01a5244dcfb98e8b8c526b71056666
-
Size
248KB
-
MD5
7f01a5244dcfb98e8b8c526b71056666
-
SHA1
24bc2878b55b31873f1081cdd9d8ef2ab4638d44
-
SHA256
db8b3fdf17aa0b3762b3487ed2c80548cf766570aec7c841ed16241167c30af8
-
SHA512
0fa55371f35090aa0634a2f3a2108f2dc251a78170686eda03a188d1bdb07a15142059a004eeedeba1b472dad3487d98d852b2bc8f6c47978ed743aaf7043b01
-
SSDEEP
6144:/6aT/tpcdoHw5O9bCdf65jPM/5zBZ3YOw:zH0O9Wdf6Bydw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7f01a5244dcfb98e8b8c526b71056666
Files
-
7f01a5244dcfb98e8b8c526b71056666.exe windows:4 windows x86 arch:x86
b26fa37a73a8990fed7c3dd42c9c2493
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFlags
WritePrivateProfileStringW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GetModuleHandleA
FormatMessageW
MulDiv
FreeResource
GlobalAddAtomW
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
MultiByteToWideChar
InterlockedExchange
GlobalLock
lstrcmpW
GlobalAlloc
GlobalDeleteAtom
GetModuleHandleW
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
GetModuleFileNameW
GetLastError
CreateThread
SetThreadPriority
WaitForSingleObjectEx
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
SetEvent
WaitForSingleObject
TerminateThread
CreateEventW
GetSystemDirectoryW
LoadLibraryW
GetProcAddress
FreeLibrary
GetTickCount
LocalAlloc
LocalFree
SetLastError
DeviceIoControl
LeaveCriticalSection
EnterCriticalSection
GetVersionExW
InitializeCriticalSection
ExitProcess
FindResourceW
LoadResource
LockResource
SizeofResource
CreateFileW
GlobalUnlock
GlobalFree
UnmapViewOfFile
VirtualFree
CloseHandle
user32
LoadCursorW
GetSysColorBrush
ShowWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
GetClassInfoExW
GetClassInfoW
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindow
GetSysColor
EndPaint
BeginPaint
ClientToScreen
GrayStringW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamW
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
UnregisterClassW
DestroyMenu
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
MessageBoxW
RegisterClassW
CreateWindowExW
PeekMessageW
DestroyWindow
DefWindowProcW
PostMessageW
PostQuitMessage
GetSystemMetrics
EnableWindow
LoadIconW
SetTimer
InvalidateRect
ReleaseDC
GetDC
GetClientRect
IsIconic
SendMessageW
DrawIcon
DrawTextExW
UnregisterClassA
gdi32
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetObjectW
RealizePalette
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
DeleteObject
CreatePalette
StretchDIBits
SelectPalette
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegSetValueExW
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathFindExtensionW
PathFindFileNameW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE