Static task
static1
Behavioral task
behavioral1
Sample
7c24c1de754b05659b5d8fd6f5e1206e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c24c1de754b05659b5d8fd6f5e1206e.exe
Resource
win10v2004-20231215-en
General
-
Target
7c24c1de754b05659b5d8fd6f5e1206e.exe
-
Size
550KB
-
MD5
7c24c1de754b05659b5d8fd6f5e1206e
-
SHA1
11cb88b4f9eec8895d52381b9d05a868b4919c3d
-
SHA256
bdd8ff34783cde634dfa8f66648d5d6fd181f27db416b4fc068d9f7805b6df5a
-
SHA512
c6425d2be3c108d2ee8c6bb215be84b4f514ff62641b057ce1d7259ab006da9f0cd859dd83948e7801d43bfb2cddf8cf2f726556c350286be77a4f2b9614868d
-
SSDEEP
12288:Td5bNzmmAfQLdbmuen/2GF+5VDoQRP5dQqNsRbzK6XaSJlys:Td5bNimLdCuejIVBzQqu9XaST
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c24c1de754b05659b5d8fd6f5e1206e.exe
Files
-
7c24c1de754b05659b5d8fd6f5e1206e.exe.exe windows:5 windows x86 arch:x86
0798ef34e36204c7134d8f6773950169
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
Imports
user32
GetWindowDC
LoadIconA
DispatchMessageW
DialogBoxParamA
GetWindowRect
IntersectRect
GetWindowLongW
SetActiveWindow
GetFocus
CopyRect
CheckMenuItem
GetDC
SetWindowLongW
CreateWindowExA
EndDialog
GetActiveWindow
TrackPopupMenu
SetScrollPos
GetWindowTextW
GetWindowLongA
DestroyWindow
ReleaseDC
IsWindow
InvalidateRect
BeginPaint
RegisterClassW
GetForegroundWindow
GetParent
TranslateMessage
MessageBoxA
MessageBeep
CharNextW
GetKeyState
OffsetRect
GetMessageW
MapWindowPoints
MsgWaitForMultipleObjects
kernel32
SetStdHandle
CreateFileA
InterlockedExchange
GetCurrentProcessId
CreateEventW
GetStartupInfoW
SetLastError
GlobalReAlloc
GetModuleFileNameW
Sleep
DuplicateHandle
GetModuleHandleA
HeapAlloc
WaitForSingleObject
InterlockedDecrement
GetFileType
GetThreadLocale
ExitProcess
TerminateProcess
GetStartupInfoA
GlobalFree
VirtualAlloc
GetEnvironmentStringsW
lstrlenA
EnterCriticalSection
GetSystemTimeAsFileTime
HeapSize
CreateDirectoryW
GetLastError
ReleaseMutex
LocalFree
GetFileAttributesA
CompareStringW
FormatMessageA
TlsGetValue
CreateProcessA
MultiByteToWideChar
LoadLibraryW
InterlockedCompareExchange
GlobalAlloc
UnhandledExceptionFilter
GetCurrentProcess
LockResource
WriteConsoleW
HeapFree
InitializeCriticalSection
FreeLibrary
GetFileSize
OutputDebugStringA
SizeofResource
GetCurrentDirectoryW
FileTimeToLocalFileTime
TlsSetValue
GetACP
LeaveCriticalSection
SetConsoleCP
ReadFile
GetProcAddress
lstrcmpiW
DeleteFileW
GetTickCount
GetCurrentThread
LocalAlloc
SetEvent
GlobalMemoryStatus
GetCPInfo
HeapCreate
CloseHandle
GetOEMCP
DeleteCriticalSection
RtlUnwind
CreateProcessW
GetLocaleInfoA
SetFilePointer
lstrcpynA
LoadLibraryExA
GetCurrentThreadId
SetUnhandledExceptionFilter
FileTimeToSystemTime
DisableThreadLibraryCalls
GetStdHandle
CreateFileMappingW
LockFile
GlobalUnlock
GetProcessHeap
HeapReAlloc
QueryPerformanceCounter
GetVersion
GetCommandLineW
GetWindowsDirectoryA
LCMapStringW
LoadLibraryA
GetCommandLineA
SetEndOfFile
VirtualProtect
GetModuleHandleW
WideCharToMultiByte
TlsFree
advapi32
RegQueryValueExW
InitializeSecurityDescriptor
RegQueryInfoKeyW
EqualSid
RegCreateKeyExW
RegEnumKeyExA
GetTokenInformation
RegOpenKeyExW
RegDeleteValueW
OpenThreadToken
RegOpenKeyExA
gdi32
StretchBlt
GetDeviceCaps
DeleteDC
GetPixel
CreateDIBSection
SelectPalette
RestoreDC
SetROP2
GetBkColor
SetTextColor
GetObjectW
LPtoDP
MoveToEx
SetWindowOrgEx
CreatePen
CreateCompatibleBitmap
SetWindowExtEx
GetTextExtentPoint32W
SaveDC
PatBlt
msvcrt
_exit
_callnewh
_onexit
calloc
wcsrchr
_unlock
malloc
memmove
__p__fmode
__p__commode
??1exception@@UAE@XZ
_initterm
__CxxFrameHandler
_purecall
atoi
memcpy
_iob
memset
_controlfp
_vsnwprintf
_amsg_exit
wcsncmp
__setusermatherr
ole32
ReleaseStgMedium
CoInitializeEx
CoGetClassObject
GetDocumentBitStg
CoCreateInstance
CoTaskMemRealloc
version
VerQueryValueA
GetFileVersionInfoW
lz32
LZOpenFileW
LZStart
LZSeek
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 61KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE