Static task
static1
Behavioral task
behavioral1
Sample
7da310cd24e3d6154a674e8b65018f45.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7da310cd24e3d6154a674e8b65018f45.exe
Resource
win10v2004-20231215-en
General
-
Target
7da310cd24e3d6154a674e8b65018f45
-
Size
451KB
-
MD5
7da310cd24e3d6154a674e8b65018f45
-
SHA1
ee6f40513f3841906d74e10b9bbd6bc0bb01b3b1
-
SHA256
c894aaeca65ebd965d19b4ee59814fbbf5d8fd98ecbea8f71f723d3568464c02
-
SHA512
056cbc96702e933d564bd40b5d7fefe987880d7a1a1f95d48d045bfd9367911cefe0da23b4c7ceead6a698bc02bd128dedf8a5d2b08f1c01abdfb27b5f28f43d
-
SSDEEP
12288:uk/4jmp+1KSG9RWQsLObdQIyWsvJb6uozL4:B4g+1KvRWQT+JjvJb6bL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7da310cd24e3d6154a674e8b65018f45
Files
-
7da310cd24e3d6154a674e8b65018f45.exe windows:4 windows x86 arch:x86
34ed2e91e2f93da493e461d1b5725579
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
user32
SendMessageA
InvalidateRect
InsertMenuA
IsWindow
OffsetRect
GetClassNameA
DestroyWindow
SetRect
GetClientRect
GetMenuItemID
SetWindowTextA
BeginPaint
GetSystemMetrics
GetDlgItem
DialogBoxParamA
GetSysColor
GetCursorPos
CallNextHookEx
DefWindowProcA
KillTimer
CreateWindowExA
SetFocus
SetCursor
CharLowerA
IsIconic
MessageBoxA
GetDC
CharUpperA
GetWindowRect
GetParent
wvsprintfA
DeleteMenu
CreateDialogParamA
EndPaint
ReleaseCapture
SetWindowsHookExA
EnumChildWindows
CallWindowProcA
RegisterClassA
GetDesktopWindow
GetWindowLongA
ReleaseDC
EndDialog
FindWindowA
SetTimer
GetWindowTextA
WinHelpA
FillRect
GetDlgItemInt
LoadBitmapA
SetWindowPos
LoadStringA
ScreenToClient
SetWindowLongA
PtInRect
SystemParametersInfoA
ClientToScreen
GetWindowPlacement
ShowWindow
SetCapture
GetWindowTextLengthA
CharPrevA
EnableWindow
SendDlgItemMessageA
SetDlgItemInt
wsprintfA
PostMessageA
LoadCursorA
MoveWindow
CharNextA
UnhookWindowsHookEx
ole32
CoCreateInstance
CoGetClassObject
comdlg32
GetOpenFileNameA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
gdi32
GetObjectA
CreateCompatibleBitmap
DeleteObject
SelectClipRgn
PlayMetaFile
SelectObject
CreateDIBSection
RestoreDC
CreateRectRgnIndirect
CreateFontA
CreateSolidBrush
StretchDIBits
SetTextColor
ExtTextOutA
SetBkMode
GetDIBits
CreateDCA
CreateHalftonePalette
CreateFontIndirectA
GetTextExtentPointA
CreatePalette
DeleteDC
CreateICA
GetDeviceCaps
PatBlt
BitBlt
CreatePatternBrush
RealizePalette
DeleteMetaFile
GetPaletteEntries
SaveDC
GetTextMetricsA
SetBkColor
SelectPalette
CreateBitmap
SetViewportExtEx
CreatePen
CreateCompatibleDC
SetViewportOrgEx
SetMapMode
SetMetaFileBitsEx
ws2_32
WSAGetLastError
comctl32
CreatePropertySheetPageA
PropertySheetA
advpack
DelNode
RegInstall
netapi32
NetDfsEnum
kernel32
CloseHandle
OpenFile
ReadFile
GlobalLock
Sleep
CompareStringW
GlobalMemoryStatus
FindFirstFileA
lstrlenW
LCMapStringW
GetVersion
GetStartupInfoA
WaitForSingleObject
GetTimeZoneInformation
IsDBCSLeadByte
MapViewOfFile
InterlockedDecrement
FreeEnvironmentStringsW
GetLocaleInfoA
GetLastError
MultiByteToWideChar
LCMapStringA
WritePrivateProfileStringA
ExitProcess
GetLocalTime
CreateThread
_lwrite
DebugBreak
GetEnvironmentStrings
GetPrivateProfileStringA
IsBadCodePtr
FindClose
SetEndOfFile
LeaveCriticalSection
GetTempPathA
LocalAlloc
GetStringTypeA
TlsSetValue
FormatMessageA
WriteFile
CreateFileMappingA
RtlUnwind
SetStdHandle
GetWindowsDirectoryA
SetEnvironmentVariableA
CreateDirectoryA
lstrcatA
GetEnvironmentStringsW
GetFileAttributesA
GlobalFree
WideCharToMultiByte
GetLocaleInfoW
GetVersionExA
CreateFileA
GetStringTypeW
DisableThreadLibraryCalls
GetACP
LocalReAlloc
CreateSemaphoreA
DeleteFileA
ExitThread
GetCurrentProcess
SetUnhandledExceptionFilter
TlsFree
GetCurrentThreadId
HeapDestroy
TerminateProcess
RaiseException
FatalAppExitA
_lopen
GetFileType
LocalFree
GetTempFileNameA
FreeLibrary
HeapReAlloc
FlushFileBuffers
IsBadReadPtr
GlobalAlloc
FindNextFileA
GetFileSize
HeapSize
GetFullPathNameA
DeleteCriticalSection
GetCurrentProcessId
GetTickCount
lstrcpynA
ReleaseSemaphore
lstrlenA
GetStdHandle
SetHandleCount
_lclose
TlsGetValue
CompareStringA
SetCurrentDirectoryA
_llseek
FreeEnvironmentStringsA
TlsAlloc
GetSystemDirectoryA
HeapCreate
SetFilePointer
GetCurrentDirectoryA
SearchPathA
SetLastError
GetCPInfo
GetUserDefaultLCID
HeapFree
GetProcAddress
MulDiv
GetVolumeInformationA
HeapAlloc
GetOEMCP
IsBadWritePtr
InitializeCriticalSection
VirtualAlloc
lstrcmpiA
GlobalHandle
EnterCriticalSection
GetSystemTime
_lread
InterlockedIncrement
GetModuleFileNameA
GetSystemDefaultLangID
VirtualFree
lstrcpyA
GetModuleHandleA
LoadLibraryA
GetSystemTimeAsFileTime
GetCommandLineA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rdata Size: 367KB - Virtual size: 366KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE