Static task
static1
Behavioral task
behavioral1
Sample
7994b3f8ca1ed9ccbed0e0dc21059cc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7994b3f8ca1ed9ccbed0e0dc21059cc9.exe
Resource
win10v2004-20231222-en
General
-
Target
7994b3f8ca1ed9ccbed0e0dc21059cc9
-
Size
39KB
-
MD5
7994b3f8ca1ed9ccbed0e0dc21059cc9
-
SHA1
631cd24da902217c458aca663de3e88d0efb73ad
-
SHA256
9a50b38bb7395af493a0891af084ba593ae91003988b7fa3f17fffd5063f1845
-
SHA512
53776df59d354ae33d76546d182b7cccac9dfcae39e63712a190bcfe55100a3417754b9971dc0e88ed9873a02de8f5238e30571ffa19d68f78affc026fd2e997
-
SSDEEP
768:MB4AL79GyxkyR1HjBCoVYejXlnWeeOfNIuCL47:MyQ76yR1smJjXlnuOfyla
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7994b3f8ca1ed9ccbed0e0dc21059cc9
Files
-
7994b3f8ca1ed9ccbed0e0dc21059cc9.exe windows:5 windows x86 arch:x86
142bf284db602b28b84d956cf9ad43bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowLongA
GetDlgItemTextA
DialogBoxIndirectParamA
ShowWindow
ExitWindowsEx
GetDesktopWindow
CharPrevA
GetWindowRect
SetWindowLongA
wsprintfA
CallWindowProcA
EndDialog
DispatchMessageA
MsgWaitForMultipleObjects
EnableWindow
SendMessageA
CharNextA
SendDlgItemMessageA
PeekMessageA
MessageBoxA
LoadStringA
SetForegroundWindow
GetDC
SetWindowTextA
SetWindowPos
GetDlgItem
SetDlgItemTextA
CharUpperA
ReleaseDC
MessageBeep
kernel32
MultiByteToWideChar
CreateFileW
WriteFile
FindResourceW
CreateFileA
LocalFree
GetFileSize
LoadResource
SizeofResource
GetSystemDefaultLangID
GetUserDefaultLangID
VirtualAlloc
HeapFree
GetProcessHeap
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetFileAttributesW
FindFirstFileW
GetTickCount
GetLastError
GetWindowsDirectoryA
lstrcmpiA
GetCurrentThreadId
SetFilePointer
FindClose
CreateDirectoryW
lstrlenA
InterlockedIncrement
GetPrivateProfileStringW
ReadFile
DeleteFileW
VirtualFree
QueryPerformanceCounter
GetPrivateProfileIntW
ReleaseSemaphore
CreateMutexA
UnhandledExceptionFilter
OpenSemaphoreA
IsBadReadPtr
SetFileAttributesA
VirtualQuery
LockResource
GetVersionExA
CreateSemaphoreA
GetCurrentProcessId
GetTempPathW
GetTempFileNameW
GetProcessVersion
VirtualLock
HeapAlloc
InterlockedDecrement
GetSystemDirectoryW
CloseHandle
SetLastError
FindNextFileW
RemoveDirectoryW
VirtualUnlock
SetEndOfFile
GetCurrentProcess
GetStartupInfoA
ReleaseMutex
IsSystemResumeAutomatic
GetSystemTime
SetDllDirectoryA
DeviceIoControl
ntdll
RtlGetDaclSecurityDescriptor
RtlInitUnicodeString
RtlInitAnsiString
RtlEqualUnicodeString
NtQuerySecurityObject
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
NtSetSecurityObject
NtQueryObject
advapi32
CryptGetHashParam
RegOpenKeyExA
RegQueryValueExA
CryptHashData
RegCloseKey
CryptCreateHash
CryptAcquireContextA
CryptDestroyHash
gdi32
CreateFontIndirectA
GetObjectA
GetStockObject
DeleteObject
ole32
CoGetInterfaceAndReleaseStream
CoCreateInstance
OleInitialize
CoMarshalInterThreadInterfaceInStream
CLSIDFromProgID
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yudf Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 129KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ