Static task
static1
Behavioral task
behavioral1
Sample
7a9dd655fb9ce58dff1e8c602504d854.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a9dd655fb9ce58dff1e8c602504d854.exe
Resource
win10v2004-20231215-en
General
-
Target
7a9dd655fb9ce58dff1e8c602504d854
-
Size
321KB
-
MD5
7a9dd655fb9ce58dff1e8c602504d854
-
SHA1
16f95e9e83f93cd8fa2f8e5abf926e44e7ad9a60
-
SHA256
f2196b8babb37a2fe71db4ceb2c5244f167bb50572e6c054e3d2bb3f434044e6
-
SHA512
3053016b039643f8888747792ea6101b9cd99db775f4f4cbba53333cab8485e13dc1d7bc24e59f30c7dfa9f748deb1bf7d1b01fa5c68f5976735f45ab0539963
-
SSDEEP
6144:0hZ3sWCoBrnrVj8UMpKxTSKF2+y7TX7g:UZ3zCorj8ZpKxBF2+2X7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a9dd655fb9ce58dff1e8c602504d854
Files
-
7a9dd655fb9ce58dff1e8c602504d854.exe windows:4 windows x86 arch:x86
6c670dbdf0b75960b0d7ff97f2214b67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DestroyWindow
EnumThreadWindows
TranslateAcceleratorA
PeekMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
CreateWindowExA
IsCharAlphaNumericA
CharUpperA
CharLowerA
GetWindowTextLengthA
GetWindowTextA
IsIconic
FindWindowA
SetMenuDefaultItem
ModifyMenuA
EnableMenuItem
TrackPopupMenu
GetSubMenu
LoadMenuA
WinHelpA
SetForegroundWindow
IsZoomed
DrawStateA
SetCapture
ReleaseCapture
InvalidateRect
SetWindowPlacement
GetWindowPlacement
GetDC
GetDesktopWindow
DrawFocusRect
GetSysColor
ScreenToClient
SetWindowPos
GetClassNameA
GetWindow
IsDialogMessageA
CreateDialogParamA
EnableWindow
GetFocus
SetFocus
MessageBoxA
RedrawWindow
DrawIconEx
GetCapture
KillTimer
GetClientRect
EndPaint
BeginPaint
DrawTextA
SetTimer
PostMessageA
UpdateWindow
GetWindowRect
ShowWindow
GetCursorPos
LoadIconA
GetSystemMetrics
LoadImageA
LoadAcceleratorsA
LoadCursorA
ReleaseDC
GetWindowDC
PtInRect
SystemParametersInfoA
GetMenuItemID
GetMenuItemCount
DestroyMenu
CallWindowProcA
DefWindowProcA
SetWindowTextA
GetParent
SendMessageA
LoadStringA
PostQuitMessage
MoveWindow
GetClassLongA
EnumChildWindows
IsWindowEnabled
IsWindowVisible
GetDlgCtrlID
GetDlgItem
GetWindowLongA
SetWindowLongA
GetMessageA
RegisterClassExA
shell32
DragAcceptFiles
Shell_NotifyIconA
DragQueryFileA
gdi32
Rectangle
MoveToEx
LineTo
CreatePen
SetTextColor
SetMapMode
GetBkColor
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBSection
SetWindowOrgEx
SetBkColor
RoundRect
ExtTextOutA
SetTextAlign
CreateSolidBrush
GetPixel
SelectObject
GetTextExtentPoint32A
DeleteObject
GetStockObject
SetROP2
comdlg32
GetOpenFileNameA
ole32
CoInitialize
CoUninitialize
advapi32
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shlwapi
SHDeleteKeyA
comctl32
PropertySheetA
kernel32
SetFilePointer
WriteFile
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
GetFullPathNameA
ExitThread
CreateThread
ResumeThread
GetVersion
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
ExitProcess
GetLocalTime
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
HeapAlloc
HeapFree
InterlockedCompareExchange
LCMapStringW
SetHandleCount
GetUserDefaultLCID
LCMapStringA
GetStringTypeExA
GetSystemInfo
VirtualQuery
VirtualFree
VirtualProtect
InterlockedExchange
LeaveCriticalSection
SetUnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GetTimeFormatA
GetDateFormatA
MultiByteToWideChar
GetVersionExA
GetFileType
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
HeapSize
SetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetLastError
GetCPInfo
GetACP
GetOEMCP
GetCurrentDirectoryA
FreeLibrary
GetDriveTypeA
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
GetStringTypeW
GetStringTypeA
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
TlsGetValue
SetEndOfFile
TlsSetValue
TlsAlloc
FlushFileBuffers
EnterCriticalSection
GetLastError
GetCurrentThreadId
GetModuleHandleA
IsBadReadPtr
GetFileAttributesA
GetWindowsDirectoryA
Sleep
GetProcAddress
LoadLibraryA
ReadFile
CloseHandle
GetFileSize
CreateFileA
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
GetStdHandle
CreateMutexA
Sections
.text Size: 248KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.JGLong Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE