Static task
static1
Behavioral task
behavioral1
Sample
7ede58810c77766909f83ef3e491681d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ede58810c77766909f83ef3e491681d.exe
Resource
win10v2004-20231215-en
General
-
Target
7ede58810c77766909f83ef3e491681d
-
Size
204KB
-
MD5
7ede58810c77766909f83ef3e491681d
-
SHA1
0a1323f38231ecbd49f909e77580ef3db3309a30
-
SHA256
55389def951b6586c2f8a54d5390086a35535638a10a113ac9eb090573cb6196
-
SHA512
acaebff1deb1b493b3656f68b00e04190deb774a2dc035384f5a4566964898a8bf39b25e145722829895eb29d4a3919efc067161dfe01ee2e9561acb37f4d7a7
-
SSDEEP
3072:sZvadRESrIVqJQd+o1+1qQWVRa2ndEERCBapiX2t4vjM:sZvobYUQF1WWVRhndEER2+ihM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ede58810c77766909f83ef3e491681d
Files
-
7ede58810c77766909f83ef3e491681d.exe windows:4 windows x86 arch:x86
a2cbe93a4dfe238afcd728952d279a66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
wininet
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
shlwapi
PathRemoveFileSpecA
PathFindExtensionA
StrStrA
PathFileExistsA
PathFindFileNameA
SHGetValueA
PathStripToRootA
PathIsUNCA
PathAppendA
kernel32
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetTimeZoneInformation
SetEnvironmentVariableA
GetEnvironmentStringsW
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
DuplicateHandle
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GlobalGetAtomNameA
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
lstrcmpA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
RaiseException
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
GetModuleHandleA
VirtualAlloc
RtlUnwind
HeapFree
LoadResource
LockResource
SizeofResource
FindResourceA
OpenMutexA
GetFileSize
ReadFile
CreateFileA
WriteFile
CopyFileA
GetTempPathA
OpenProcess
DeleteFileA
GetComputerNameA
Sleep
SetLastError
CreateMutexA
GetLastError
lstrlenA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
InterlockedExchange
WaitForSingleObject
TerminateProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
LocalFree
user32
DestroyMenu
PostQuitMessage
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
GetFocus
ClientToScreen
GetDlgCtrlID
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
CheckMenuItem
LoadIconA
WinHelpA
EnumWindows
PostMessageA
FindWindowExA
GetWindowThreadProcessId
CharUpperA
SendMessageTimeoutA
FindWindowA
GetWindowTextA
GetWindow
GetDesktopWindow
GetSysColorBrush
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
RegisterWindowMessageA
gdi32
GetClipBox
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SelectObject
CreateBitmap
SetMapMode
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
OffsetViewportOrgEx
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
SetNamedSecurityInfoA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ