Static task
static1
Behavioral task
behavioral1
Sample
7d8be15f3b62f07bc211a4c6fe0ae2d8.exe
Resource
win7-20231215-en
General
-
Target
7d8be15f3b62f07bc211a4c6fe0ae2d8
-
Size
658KB
-
MD5
7d8be15f3b62f07bc211a4c6fe0ae2d8
-
SHA1
13687a7acd15089152f885458561115fef06a39f
-
SHA256
066a926cf6e76796a7d6b618fe203cc39ea0a4af7abb5b3d0983f497e232ea82
-
SHA512
761e1220e62473e6b44826ad2661b2de42b5f855fc3b27b689daa034fc4da8c00e5d702830f6da99af32e65552ceca4feb325eccf2864460ef9dcff52761e880
-
SSDEEP
12288:v/wAfXETz9n2YwyuqlsnBj4W7rtV0nFwrO1jav95fT9bfYEsz91r5Wg0kU6iirfv:wAPg9n2BdBj4W/toFw0q95LtYEsz91dp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d8be15f3b62f07bc211a4c6fe0ae2d8 -
NSIS installer 1 IoCs
resource yara_rule sample nsis_installer_2
Files
-
7d8be15f3b62f07bc211a4c6fe0ae2d8.exe windows:5 windows x86 arch:x86
f7b5f97b2884e8c1316d6693544cc58b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetTextExtentPointA
EnumObjects
SaveDC
RestoreDC
ResetDCA
CreateFontA
SetBkColor
GetDeviceCaps
GetCharWidth32A
ExtTextOutA
GetFontData
SetTextAlign
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
AbortDoc
SelectObject
advapi32
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumValueA
RegOpenKeyExA
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
AddAce
RegDeleteValueA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
SHGetFileInfoA
SHFileOperationA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
RemoveDirectoryA
GetVersion
GetSystemDirectoryA
lstrcatA
lstrlenA
GetTempFileNameA
CreateProcessA
Sleep
SetFileAttributesA
GetLastError
MulDiv
GetTickCount
ReadFile
SetFilePointer
WriteFile
CreateFileA
GlobalAlloc
GetFileSize
GetModuleFileNameA
CreateDirectoryA
SuspendThread
GlobalDeleteAtom
UnlockFile
CloseHandle
GetCurrentProcess
CopyFileA
SetCurrentDirectoryA
lstrcmpiA
ExitProcess
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
GetModuleHandleA
GetCommandLineA
SetErrorMode
GlobalFree
FreeLibrary
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
LoadLibraryA
GetFileAttributesA
TlsSetValue
TlsGetValue
TlsAlloc
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
GetProcAddress
LoadLibraryExA
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
lstrcmpA
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
user32
MessageBoxIndirectA
CharPrevA
GetSysColor
GetDlgItemTextA
SetWindowTextA
wsprintfA
SetTimer
ShowWindow
CreateDialogParamA
DestroyWindow
EndPaint
DrawTextA
FillRect
GetClientRect
BeginPaint
DefWindowProcA
DrawTextExA
EnumDisplayDevicesA
IsClipboardFormatAvailable
GetQueueStatus
GetWindowLongA
RegisterClassA
PostQuitMessage
WaitMessage
ReplyMessage
TranslateMessage
DispatchMessageA
PeekMessageA
SendMessageA
GetMessageA
CreateWindowExA
ExitWindowsEx
CharNextA
EnableWindow
SetCursor
LoadCursorA
GetDlgItem
CheckDlgButton
InvalidateRect
ScreenToClient
GetMessagePos
CallWindowProcA
IsWindowVisible
SetWindowLongA
LoadBitmapA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
GetWindowRect
AppendMenuA
CreatePopupMenu
GetSystemMetrics
EndDialog
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
DialogBoxParamA
GetClassInfoA
SystemParametersInfoA
LoadImageA
GetDC
IsWindow
FindWindowExA
SendMessageTimeoutA
SetForegroundWindow
SetDlgItemTextA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 144KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ