Static task
static1
Behavioral task
behavioral1
Sample
7d0d0777ac7024162d030f9ed4fd44cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d0d0777ac7024162d030f9ed4fd44cb.exe
Resource
win10v2004-20231215-en
General
-
Target
7d0d0777ac7024162d030f9ed4fd44cb
-
Size
461KB
-
MD5
7d0d0777ac7024162d030f9ed4fd44cb
-
SHA1
53b2e3f0fcda013f8b4f6f9a2a6aeb415401d2c2
-
SHA256
20e9de0e7eef97bb44577efdb504ded325873341487983d56dd148b48acea238
-
SHA512
602bd561b912689cda823f8b4dc10b283be2b0b74909dbadd4e3740c97069f7b480d19e4ea3646f375d8f64ed4455f0b8dfcbd4331107f4508f63b812288ca7e
-
SSDEEP
12288:9gU0yYiGcuknDvp93eb/tCDy+qnSqukjOiCJgr:idyDGcxDvGblCTqjOiCJgr
Malware Config
Signatures
Files
-
7d0d0777ac7024162d030f9ed4fd44cb.exe windows:4 windows x86 arch:x86
78aaba4815ad3cfedee906bd73dce001
Code Sign
b5:c6:7b:86:5e:3e:9b:c7:8c:15:1b:f5:6d:ea:67:ed:8d:e6:a3:d6Signer
Actual PE Digestb5:c6:7b:86:5e:3e:9b:c7:8c:15:1b:f5:6d:ea:67:ed:8d:e6:a3:d6Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
WriteFile
GetLastError
CloseHandle
GetTickCount
CreateFileMappingA
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
GetCommandLineA
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
LockResource
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
SetFilePointer
CreateFileA
VirtualAlloc
GetVersionExA
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
GetModuleHandleW
lstrcmpiA
ExitProcess
CreateThread
ReadFile
GetModuleHandleA
GetProcAddress
GetOEMCP
user32
RegisterClassW
GetDC
MessageBoxA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
GetSystemMetrics
InvalidateRect
IsChild
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
CreateDialogParamA
SetScrollRange
LoadStringA
GetClientRect
DialogBoxParamA
CreateWindowExA
GetWindowLongA
gdi32
Rectangle
TextOutW
CreatePen
CreatePenIndirect
GetClipBox
ExcludeClipRect
GetDeviceCaps
SetBkColor
advapi32
RegSetValueExW
RegCreateKeyExA
AllocateLocallyUniqueId
RegCloseKey
GetUserNameA
ole32
CoUninitialize
CoTaskMemAlloc
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 408KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ