d:\zjjoyfx\tejcxoet\setewl\afxe\oqn\ozeteitb.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7a32eb1d36e7698d1767a19f68b94d79.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a32eb1d36e7698d1767a19f68b94d79.exe
Resource
win10v2004-20231222-en
General
-
Target
7a32eb1d36e7698d1767a19f68b94d79
-
Size
648KB
-
MD5
7a32eb1d36e7698d1767a19f68b94d79
-
SHA1
27f0948734b521b808804a10a57fbbf03913ca53
-
SHA256
1ac49d561df2d964266dfc535eb5419cf340c22296288a0812719910c72f4ca1
-
SHA512
935006abc053f2278d52bfaae80ca11fb5b9ba1e236c0d71de6c01ec7740a2296504edc6f798e91db5e33fd39512dc90ff4cf0b465c9007e2ba3b90e8baf94a6
-
SSDEEP
12288:b0lEDuEYR0NEG94ZK3ZAZlLlgEyDCCqW6B/PYHBYsQKrfYxqPdod5ACXen4:b0lExYR0N6iZ4Ll0Dj/HB6mJFEGCX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a32eb1d36e7698d1767a19f68b94d79
Files
-
7a32eb1d36e7698d1767a19f68b94d79.exe windows:4 windows x86 arch:x86
fb46be956c0d8712e0097781d3e540aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_GetDragImage
ImageList_AddMasked
DrawInsert
ImageList_DragEnter
ImageList_EndDrag
ImageList_Duplicate
ImageList_GetImageInfo
ImageList_Merge
ImageList_SetFlags
InitCommonControlsEx
CreatePropertySheetPageW
MakeDragList
kernel32
GetFileAttributesW
WriteConsoleA
CompareStringA
GetConsoleMode
CompareStringW
GetCPInfo
RtlFillMemory
GetCurrentThread
GetTempPathA
RtlUnwind
SetConsoleCtrlHandler
SetConsoleCursorInfo
CreateWaitableTimerA
ExitProcess
HeapDestroy
GetStringTypeExW
EnumSystemCodePagesA
TransactNamedPipe
GetConsoleCP
LocalShrink
GetACP
GetLocaleInfoA
GetTimeFormatA
TlsGetValue
GetDiskFreeSpaceExW
VirtualFree
GetTempFileNameA
WaitForMultipleObjects
GetDateFormatW
SetThreadLocale
SetThreadPriority
WritePrivateProfileStructW
GetCurrentThreadId
WriteProfileSectionW
IsBadReadPtr
GetProfileStringW
IsDebuggerPresent
VirtualQuery
IsValidLocale
GetStartupInfoW
ResumeThread
SetStdHandle
EnumCalendarInfoW
GetLocaleInfoW
GetThreadLocale
SetThreadIdealProcessor
EnumTimeFormatsA
InterlockedIncrement
GetCommandLineW
MultiByteToWideChar
GetFileType
GlobalFix
SetEnvironmentVariableA
WriteConsoleOutputAttribute
CloseHandle
GetConsoleOutputCP
InitializeCriticalSection
CommConfigDialogW
HeapFree
FindNextFileW
SetLastError
GetStartupInfoA
FlushFileBuffers
HeapReAlloc
HeapLock
IsValidCodePage
GetUserDefaultLCID
FreeEnvironmentStringsW
UnhandledExceptionFilter
EnumDateFormatsW
LocalLock
InterlockedExchange
InitializeCriticalSectionAndSpinCount
VirtualFreeEx
GlobalFindAtomA
CreateFileA
HeapCreate
GetLastError
FreeLibrary
MapViewOfFileEx
GetTimeZoneInformation
TlsFree
VirtualAlloc
HeapSize
GetStdHandle
SetConsoleTitleW
LCMapStringW
CreateWaitableTimerW
GetComputerNameW
GetFileTime
GetExitCodeProcess
GetDriveTypeW
TerminateProcess
CreateProcessW
EnterCriticalSection
FindClose
GetOEMCP
LCMapStringA
GetProcAddress
GetModuleHandleA
QueryPerformanceCounter
GetCommandLineA
GetModuleFileNameA
EnumResourceTypesW
ReadFile
EnumResourceTypesA
UnlockFileEx
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleFileNameW
GetTickCount
SetFilePointer
SetHandleCount
GetCurrentProcessId
lstrcatA
EnumSystemLocalesA
GetLongPathNameA
GetSystemTimeAsFileTime
ReadConsoleW
GetStringTypeA
GetCurrentProcess
DosDateTimeToFileTime
EnumCalendarInfoExA
Sleep
CreateMutexA
LeaveCriticalSection
InterlockedDecrement
WriteConsoleW
GetModuleHandleW
TlsAlloc
SetSystemTime
GetDateFormatA
GetEnvironmentStringsW
WideCharToMultiByte
OpenMutexA
LoadLibraryA
HeapAlloc
GetVersionExA
DeleteCriticalSection
CreatePipe
WriteFile
TlsSetValue
user32
DdeUnaccessData
SystemParametersInfoW
EnumDisplayMonitors
SetCapture
SetWindowsHookA
OemKeyScan
GetKeyboardLayout
CreateIconFromResourceEx
GetPriorityClipboardFormat
GetClassNameW
DrawAnimatedRects
CharToOemW
EndPaint
FlashWindow
GetInputState
GetWindow
DdeKeepStringHandle
GetAncestor
DdeUninitialize
PeekMessageA
DefWindowProcW
GetMenuStringA
GetFocus
ScrollWindowEx
CheckMenuRadioItem
OemToCharBuffW
IsDialogMessage
SetMenuInfo
GetKeyNameTextA
SetRect
IsCharAlphaNumericA
UnloadKeyboardLayout
MessageBoxW
ShowWindow
ArrangeIconicWindows
SetWindowTextW
GetUpdateRect
AdjustWindowRectEx
DefMDIChildProcA
EnumDisplaySettingsExA
OemToCharBuffA
ScrollDC
CallWindowProcW
WinHelpA
RegisterClassA
SetUserObjectInformationW
EnumDesktopWindows
CharLowerA
SetDlgItemTextW
SetWinEventHook
MessageBoxIndirectW
CreateWindowExW
DestroyWindow
GetWindowLongW
SendMessageTimeoutA
WindowFromPoint
ExitWindowsEx
CloseClipboard
RegisterClassExA
GetOpenClipboardWindow
GetDCEx
DragObject
PeekMessageW
LoadCursorFromFileA
DragDetect
WindowFromDC
BringWindowToTop
GetComboBoxInfo
SetCaretPos
advapi32
CryptEnumProvidersW
RegOpenKeyA
CryptExportKey
LookupPrivilegeNameA
RegNotifyChangeKeyValue
RegConnectRegistryW
CryptGetKeyParam
RegFlushKey
LookupPrivilegeValueA
CryptGetDefaultProviderW
RegEnumKeyExA
RegQueryMultipleValuesW
LookupPrivilegeNameW
RegRestoreKeyW
RegSaveKeyW
RegLoadKeyA
RegConnectRegistryA
RegDeleteValueW
StartServiceA
AbortSystemShutdownW
wininet
GopherGetLocatorTypeA
FtpOpenFileW
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ