DSAXZCTYHJKIOP
Static task
static1
Behavioral task
behavioral1
Sample
7bdd1409b080eb8510163cea3761d694be0eaec7e22bc44736cbfbc3025a310b.exe
Resource
win7-20240221-en
General
-
Target
5638c67a0d982912e24034cf07db35b31bf90faab98f7f833dbc4417a87fe9e4
-
Size
283KB
-
MD5
ec07fb3fdbbde3a65423d47c6fd5b4d9
-
SHA1
f8fe4aebbc33306752e665944ab4526937804c56
-
SHA256
5638c67a0d982912e24034cf07db35b31bf90faab98f7f833dbc4417a87fe9e4
-
SHA512
d30f17540d4402197f6394b4219853fc79e5016907c3f1f005d5ee515f5cd64e44c69a8ccae8a6434ebee97addca48afeadbb370d39db7696a63b7901431539f
-
SSDEEP
6144:LSSr/csaVDTIEJ17WIhxIbk+fd+pFKf8iEJL8MDV2YehFu2YpsWEV:L/cJtdJzII+fj+JLb/6Fu2Y6WK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7bdd1409b080eb8510163cea3761d694be0eaec7e22bc44736cbfbc3025a310b.exe
Files
-
5638c67a0d982912e24034cf07db35b31bf90faab98f7f833dbc4417a87fe9e4.zip
Password: infected
-
7bdd1409b080eb8510163cea3761d694be0eaec7e22bc44736cbfbc3025a310b.exe.exe windows:4 windows x86 arch:x86
d198f094149dab1e82d260530afc5ac6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
CreateThread
HeapReAlloc
HeapSize
SetUnhandledExceptionFilter
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
FatalAppExitA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
TerminateProcess
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
SetConsoleCtrlHandler
SetStdHandle
GetLocaleInfoW
SetEnvironmentVariableA
ExitProcess
GetCommandLineA
GetStartupInfoA
HeapFree
HeapAlloc
RaiseException
RtlUnwind
GetDiskFreeSpaceA
GetTempFileNameA
LocalLock
LocalUnlock
GetTickCount
GetFileTime
GetFileAttributesA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
SetErrorMode
SystemTimeToFileTime
FileTimeToSystemTime
GetOEMCP
GetCPInfo
GetShortPathNameA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
DeleteFileA
MoveFileA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedIncrement
GetCurrentDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
InterlockedDecrement
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
GetLastError
SetLastError
CopyFileA
MulDiv
GlobalSize
FormatMessageA
lstrcpynA
LocalFree
GlobalUnlock
GlobalFree
FreeResource
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
CloseHandle
GlobalAddAtomA
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
GetStringTypeExW
GetStringTypeExA
GetEnvironmentVariableW
GetEnvironmentVariableA
lstrlenA
lstrcmpiW
lstrcmpiA
CompareStringW
lstrlenW
CompareStringA
GetVersion
MultiByteToWideChar
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetEnvironmentStringsW
InterlockedExchange
user32
GetTabbedTextExtentA
GetDCEx
LockWindowUpdate
SetParent
RegisterWindowMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetMenu
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
UnregisterClassA
SetWindowPlacement
GetDlgCtrlID
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetMenuStringA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
GetWindow
SetWindowContextHelpId
BringWindowToTop
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
IsClipboardFormatAvailable
EndDialog
SetMenuItemBitmaps
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetParent
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
PostQuitMessage
wsprintfA
PostMessageA
RegisterClassA
DrawIcon
AppendMenuA
SendMessageA
SetMenu
TranslateAcceleratorA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
GetDialogBaseUnits
LoadCursorA
BeginPaint
DrawTextA
EndPaint
SetCursor
RedrawWindow
MessageBoxA
DefWindowProcA
GetDesktopWindow
MoveWindow
GetWindowLongA
GetDlgItem
GetWindowRect
FindWindowExA
SetWindowLongA
KillTimer
SetTimer
PostThreadMessageA
UnionRect
MapVirtualKeyA
GetKeyNameTextA
RegisterClipboardFormatA
LoadMenuA
UnpackDDElParam
CreateWindowExA
SetWindowPos
CharUpperW
CharUpperA
CharLowerW
CharLowerA
LoadStringW
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
GetNextDlgTabItem
SetRectEmpty
DestroyIcon
GetSysColorBrush
DeleteMenu
WaitMessage
GetWindowThreadProcessId
ReleaseCapture
WindowFromPoint
SetCapture
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
DestroyMenu
GetMenuItemInfoA
InflateRect
ScrollWindowEx
ShowWindow
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
GetDlgItemTextA
CheckDlgButton
MapDialogRect
CheckRadioButton
GetDlgItemInt
gdi32
SetMapperFlags
SetArcDirection
SetColorAdjustment
SelectClipRgn
GetClipRgn
CreateRectRgn
SelectClipPath
GetViewportExtEx
GetWindowExtEx
GetPixel
StartDocA
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
PolyDraw
PolylineTo
PolyBezierTo
ExtSelectClipRgn
DeleteDC
SetTextCharacterExtra
CreatePatternBrush
GetStockObject
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
CreatePen
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
GetTextMetricsA
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
CreateCompatibleBitmap
StretchDIBits
GetCharWidthA
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
SetTextJustification
SetTextAlign
MoveToEx
LineTo
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
SetMapMode
SetStretchBltMode
SetROP2
SetPolyFillMode
RestoreDC
SaveDC
GetTextExtentPoint32A
ExtTextOutA
BitBlt
CreateCompatibleDC
CreateFontIndirectA
GetObjectA
SetBkColor
GetClipBox
GetDCOrgEx
CopyMetaFileA
GetDeviceCaps
CreateDCA
CreateBitmap
CreateDIBPatternBrushPt
DeleteObject
SelectObject
SetTextColor
SetBkMode
CreateFontA
comdlg32
PrintDlgA
PageSetupDlgA
FindTextA
ReplaceTextA
CommDlgExtendedError
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
GetJobA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
GetFileSecurityA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
RegQueryValueA
RegSetValueA
RegCreateKeyA
RegCloseKey
SetFileSecurityA
shell32
DragFinish
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetFileInfoA
DragQueryFileA
SHGetMalloc
ExtractIconA
comctl32
_TrackMouseEvent
ord17
ImageList_Draw
ImageList_GetImageInfo
ord13
ImageList_Read
ImageList_Write
ord14
ImageList_Destroy
ImageList_Create
ImageList_LoadImageA
ImageList_Merge
shlwapi
PathRemoveExtensionA
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleDuplicateData
ReleaseStgMedium
CoTaskMemAlloc
CreateBindCtx
CoTreatAsClass
CoDisconnectObject
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
StringFromGUID2
OleRun
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRegisterClassObject
CoRevokeClassObject
CreateStreamOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
StringFromCLSID
OleSetClipboard
oleaut32
SysFreeString
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
SysStringByteLen
OleCreateFontIndirect
SystemTimeToVariantTime
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
SafeArrayRedim
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroyData
SafeArrayDestroyDescriptor
VariantTimeToSystemTime
SysAllocString
SysReAllocStringLen
VarBstrFromDec
VarDecFromStr
VarCyFromStr
VarBstrFromCy
VarDateFromStr
VarBstrFromDate
LoadTypeLi
SysAllocStringLen
oleacc
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
Exports
Exports
Sections
.text Size: 340KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 180KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ