Static task
static1
Behavioral task
behavioral1
Sample
7faf2fa6f6d5601a23d0b4ecdb109327.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7faf2fa6f6d5601a23d0b4ecdb109327.exe
Resource
win10v2004-20231215-en
General
-
Target
7faf2fa6f6d5601a23d0b4ecdb109327
-
Size
75KB
-
MD5
7faf2fa6f6d5601a23d0b4ecdb109327
-
SHA1
6eadd9418f340670dfd634cef06c2f8cb8b42469
-
SHA256
7f62ad08b0840648d6c61558670721e8f60632729c9e20d0ead0b12322a2152a
-
SHA512
526df9025d2415cf8e5bd2a762a3f787a987df279228078e274279a9d036432f936c7c2fb9f997d29a4175dc22395ef287f0a55816c0ae0dbe66f72cdca2d292
-
SSDEEP
1536:YRSyqGQmgKLOvgyecAzYvjjjflxhw46r8ADCt8hYeHf:qqGQuLK/ecRvjlxn6r8A+t8X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7faf2fa6f6d5601a23d0b4ecdb109327
Files
-
7faf2fa6f6d5601a23d0b4ecdb109327.exe windows:4 windows x86 arch:x86
bcbac69ca7ebf115a6066ff27b57a38b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetConsoleHardwareState
FileTimeToSystemTime
PeekConsoleInputA
ScrollConsoleScreenBufferA
FatalExit
ExpandEnvironmentStringsW
FindAtomA
GetDiskFreeSpaceExW
FindAtomW
VirtualAlloc
EnumDateFormatsA
SearchPathA
GetConsoleAliasesLengthA
lstrcpyn
user32
DrawFrame
ScrollDC
MenuItemFromPoint
ReleaseCapture
GetNextDlgGroupItem
DdeQueryStringW
GetMenuState
GetScrollInfo
GetMessageA
DispatchMessageA
UnpackDDElParam
ShowScrollBar
TileChildWindows
GetUserObjectSecurity
LoadAcceleratorsA
GetWindowRect
AdjustWindowRect
SetLastErrorEx
MoveWindow
CopyAcceleratorTableA
CharToOemW
DragObject
EnumThreadWindows
DdeUnaccessData
SetCaretPos
SystemParametersInfoW
GetTabbedTextExtentW
DefMDIChildProcW
CreateIconIndirect
TrackPopupMenuEx
DdeEnableCallback
GetClipboardFormatNameA
CreateWindowStationW
DlgDirListA
IsCharAlphaNumericA
ChildWindowFromPoint
MenuWindowProcA
SetForegroundWindow
SetCapture
gdi32
GetMiterLimit
MoveToEx
GetDCOrgEx
GetRasterizerCaps
SetICMProfileW
GetDeviceCaps
GetRandomRgn
GetTextColor
PolyTextOutW
SaveDC
Ellipse
GetEnhMetaFileW
GetEnhMetaFileA
GetDIBColorTable
GetTextFaceA
GdiAddFontResourceW
AddFontResourceW
GdiCreateLocalEnhMetaFile
ScaleWindowExtEx
CreateDCW
EnumEnhMetaFile
TextOutW
GetObjectA
CreateBrushIndirect
ExtFloodFill
GetGlyphOutlineW
SetPixelFormat
GetPixelFormat
ole32
BindMoniker
StgGetIFillLockBytesOnFile
ReadStringStream
CoSetState
OleCreateFromData
CreateFileMoniker
HMETAFILE_UserFree
ReadFmtUserTypeStg
CoCreateFreeThreadedMarshaler
OleCreateFromDataEx
HMETAFILE_UserSize
CoResumeClassObjects
WriteClassStm
CoRevokeMallocSpy
ReleaseStgMedium
HPALETTE_UserSize
HWND_UserUnmarshal
DllDebugObjectRPCHook
HPALETTE_UserUnmarshal
OleIsCurrentClipboard
CreateILockBytesOnHGlobal
CreateGenericComposite
CoIsOle1Class
CoGetInterfaceAndReleaseStream
HENHMETAFILE_UserMarshal
HWND_UserFree
PropSysFreeString
STGMEDIUM_UserUnmarshal
CoFreeLibrary
CoLockObjectExternal
CoAddRefServerProcess
CreateClassMoniker
HBITMAP_UserSize
OleLoad
StgIsStorageILockBytes
HBRUSH_UserFree
OleCreateStaticFromData
HACCEL_UserFree
oleaut32
VarI4FromDec
VarDecFromCy
VarUI4FromI2
VarI2FromCy
VarBstrFromR4
SafeArrayLock
VARIANT_UserMarshal
VarUI4FromI4
VarI4FromDisp
VarDecFromDate
VarI4FromI2
VarI2FromR4
VarCyFromUI1
VarI1FromBool
OleCreatePictureIndirect
VariantCopy
VarUI2FromBool
VarI1FromUI4
VarBstrFromUI4
VarCyFromR4
VarDecFromI4
VarUI1FromDisp
SysFreeString
OaBuildVersion
VarUI4FromR4
DllRegisterServer
VarI1FromDisp
SysAllocString
VarCyFromBool
VarParseNumFromStr
VarR8FromUI4
VarDateFromDec
Sections
.idata Size: 5KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 25KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ