R:\QqgbryulgKmLO\jeIyiNr\nDKcmkjjyxiyz\vIojRhswqx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7e318f9284e58e154c4d29752b4b4b1b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e318f9284e58e154c4d29752b4b4b1b.exe
Resource
win10v2004-20231215-en
General
-
Target
7e318f9284e58e154c4d29752b4b4b1b
-
Size
106KB
-
MD5
7e318f9284e58e154c4d29752b4b4b1b
-
SHA1
ac56db911887cbd6f1f6cf188789bedad6ecb40b
-
SHA256
2c73df14d6820666fe076ff7b4d313d21e68c7882c4a5898b30c85fc3e67cbbf
-
SHA512
997abf4ca4b947c9a993ea17c5bd4fff84af283ff55103c62d429f2267f9ff18351cd5e3c8365f7a15b5c359fce866acd0c9144c5432f12001780a64bd1afd9c
-
SSDEEP
1536:s4qySgkyh6CkU1NGDJDBf01XqnEfJvpcR7Nd5WscaRR2zzZdJ+3MjzLqTFs6R0Vv:YpO6CzjZqEfJ4J+2zGzNZXSqJVAe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e318f9284e58e154c4d29752b4b4b1b
Files
-
7e318f9284e58e154c4d29752b4b4b1b.exe windows:5 windows x86 arch:x86
0a3f3f6792f0608ae2f961dbaa145102
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
ShowCaret
PostQuitMessage
GetMenuStringW
MapVirtualKeyExW
EnableMenuItem
EndDialog
GetSysColor
ShowOwnedPopups
CharToOemA
PostThreadMessageA
ModifyMenuW
InsertMenuItemW
GetMessageExtraInfo
GetKeyState
GetClientRect
IsDialogMessageW
GetDlgCtrlID
GetDialogBaseUnits
CharToOemW
GetWindow
EnumThreadWindows
GetClassLongW
OpenInputDesktop
EnableWindow
RegisterWindowMessageA
GetClassInfoExW
DrawMenuBar
IsCharAlphaW
DestroyMenu
MoveWindow
CharUpperW
GetShellWindow
GetAltTabInfoW
DestroyIcon
PostMessageA
GetMenuItemRect
InsertMenuA
GetWindowDC
comdlg32
PrintDlgW
GetOpenFileNameW
GetSaveFileNameA
FindTextW
advapi32
SetSecurityDescriptorOwner
GetNumberOfEventLogRecords
gdi32
GetMapMode
SetAbortProc
SetDIBitsToDevice
GetObjectW
SetBitmapDimensionEx
CreateICW
MoveToEx
Ellipse
GetNearestColor
StretchBlt
ExtFloodFill
IntersectClipRect
PatBlt
StartDocW
kernel32
lstrcatW
SetFileAttributesA
lstrcpyW
GetFullPathNameW
FileTimeToLocalFileTime
CallNamedPipeW
OpenFileMappingW
CopyFileA
GlobalAlloc
LockFile
GetFileType
HeapReAlloc
UnlockFile
SystemTimeToFileTime
SetCommBreak
GetAtomNameW
comctl32
ImageList_GetIcon
PropertySheetA
ImageList_Write
DestroyPropertySheetPage
msvcrt
mbtowc
_controlfp
iswprint
__set_app_type
strcpy
puts
wcsstr
__p__fmode
srand
__p__commode
strerror
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
ftell
_exit
_cexit
__setusermatherr
strspn
wcspbrk
memcpy
__getmainargs
Exports
Exports
AlphaBlend
GradientFill
TransparentBlt
?ValidateSDKldjhJLD@@YGKEPA_WG@Z
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idat Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dat_0 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_1 Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dat_2 Size: 1024B - Virtual size: 643B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ydiag Size: 512B - Virtual size: 78B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mem Size: - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdiag Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ