Static task
static1
Behavioral task
behavioral1
Sample
d7b7926f675387ebfae6c460023772e4.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d7b7926f675387ebfae6c460023772e4.exe
Resource
win10v2004-20240226-en
General
-
Target
d7b7926f675387ebfae6c460023772e4
-
Size
659KB
-
MD5
d7b7926f675387ebfae6c460023772e4
-
SHA1
5280ddc5bed86e19568b1b6f0ffdfe94ed233060
-
SHA256
ec96ab1fda31b786fe3ae23cc739ec309d5eccf19d7aac4aa6450f1d32c82a6c
-
SHA512
ea35553f76248a2739648c7aa41ac0aa33f28cfce9f90d1f2b5ea9cddd51889ac35feaed5fb57ebabb17c478ea656f2d8e6ca2039db1a669eb8c2ad071470727
-
SSDEEP
12288:q3tXwH/OSIzHgHvb0Q1iLAcvbLb30/s25F+t8djyL7/XS8TMy:GtCwKvb0xzLSfYS8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7b7926f675387ebfae6c460023772e4
Files
-
d7b7926f675387ebfae6c460023772e4.exe windows:5 windows x86 arch:x86
7069ca5544d281a3e2b281dce2f53176
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
RegQueryValueExA
RegCloseKey
RegSetValueExW
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
user32
InvalidateRect
PostQuitMessage
SetWindowPos
GetDC
TranslateMessage
GetActiveWindow
DestroyWindow
GetMessageA
GetParent
UpdateWindow
EnableWindow
PeekMessageA
CreateWindowExA
EndPaint
SetFocus
BeginPaint
DefWindowProcA
GetSystemMetrics
GetWindowRect
SetWindowLongA
EndDialog
SetWindowTextA
SetTimer
GetDlgItem
TrackPopupMenu
SetForegroundWindow
DrawTextA
SendMessageA
GetClientRect
CallWindowProcA
MessageBoxA
kernel32
LoadLibraryW
LCMapStringW
HeapReAlloc
GetACP
RtlUnwind
SetLastError
TlsAlloc
SetHandleCount
FreeEnvironmentStringsW
FreeEnvironmentStringsA
TerminateProcess
GetVersion
GetProcessHeap
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
WaitForSingleObject
GetOEMCP
VirtualAlloc
Sleep
VirtualFree
HeapCreate
SizeofResource
GetModuleHandleW
CloseHandle
FindFirstFileA
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
WideCharToMultiByte
LockResource
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
InitializeCriticalSection
GetLastError
LeaveCriticalSection
ExitProcess
TlsSetValue
GetFileType
FindFirstFileW
FindNextFileW
CompareStringW
GetProcAddress
DeleteFileW
GetWindowsDirectoryA
FindNextFileA
GetStartupInfoA
LoadLibraryA
GetVersionExA
GetTickCount
QueryPerformanceCounter
SetEvent
GetFileSize
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetCurrentThreadId
SetEndOfFile
GlobalAlloc
WriteConsoleA
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
MultiByteToWideChar
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
InterlockedDecrement
FormatMessageA
TlsGetValue
LoadResource
GetEnvironmentVariableA
LocalFree
FreeLibrary
GetStringTypeW
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
GetCPInfo
SetStdHandle
CreateFileA
LocalAlloc
GetLocaleInfoA
GetCurrentProcess
DeleteCriticalSection
GetFileAttributesW
HeapDestroy
gdi32
SetBkColor
BitBlt
GetDeviceCaps
DeleteDC
GetStockObject
CreateCompatibleDC
SelectObject
CreateSolidBrush
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 604KB - Virtual size: 603KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ