Static task
static1
Behavioral task
behavioral1
Sample
7dcb925cf82bb6aa41788f78a00179f49edf5e93029f000b24ca7f6c67fa77c1.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7dcb925cf82bb6aa41788f78a00179f49edf5e93029f000b24ca7f6c67fa77c1.exe
Resource
win10v2004-20240508-en
General
-
Target
7dcb925cf82bb6aa41788f78a00179f49edf5e93029f000b24ca7f6c67fa77c1
-
Size
1.7MB
-
MD5
5f914053729c628769a7268f705fead9
-
SHA1
afc2bd3e9c77549493200375efb0bc233593ff7f
-
SHA256
7dcb925cf82bb6aa41788f78a00179f49edf5e93029f000b24ca7f6c67fa77c1
-
SHA512
8c5f9d20bd196a31dece4db232916b1614ff7d4180654f0ff8e2fa98c743c559c5910e26131eac796fa2512c0772b18d6c6a6d9916638dad4f9cd23fe8615a0a
-
SSDEEP
24576:yb328T3FIZrM1vcXYZ+ZFVsJcB3iHgb6H1Owo2vpRZpQR58bjB+6hZe34t/:ybv40+nyHC8oqpQR58bjAl34t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7dcb925cf82bb6aa41788f78a00179f49edf5e93029f000b24ca7f6c67fa77c1
Files
-
7dcb925cf82bb6aa41788f78a00179f49edf5e93029f000b24ca7f6c67fa77c1.exe windows:5 windows x86 arch:x86
dbdee7cd67c5e2729783b419fca5c588
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockFile
WideCharToMultiByte
MultiByteToWideChar
SizeofResource
GetStartupInfoW
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
GetDriveTypeW
MoveFileA
HeapValidate
IsBadReadPtr
ExitProcess
DeleteFileA
GetTimeFormatA
GetDateFormatA
CreateThread
ExitThread
SetStdHandle
GetFileType
VirtualQuery
DebugBreak
GetStdHandle
WriteConsoleW
LCMapStringA
LCMapStringW
GetCPInfo
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
GetACP
GetOEMCP
IsValidCodePage
GetCurrentDirectoryA
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
WriteConsoleA
GetConsoleOutputCP
CreateFileA
CreateProcessA
GetDriveTypeA
FreeEnvironmentStringsA
GetEnvironmentStrings
SetEnvironmentVariableA
LockResource
LoadResource
CreateFileMappingA
VirtualAlloc
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
RaiseException
OutputDebugStringA
OpenEventA
GetFileSizeEx
GetFileAttributesW
GetTickCount
VirtualProtect
GlobalFlags
WritePrivateProfileStringW
FileTimeToSystemTime
GetAtomNameW
SetErrorMode
GetFullPathNameW
FindFirstFileW
FindClose
SetEndOfFile
UnlockFile
OutputDebugStringW
FlushFileBuffers
SetFilePointer
WriteFile
DuplicateHandle
lstrlenA
InterlockedIncrement
GetThreadLocale
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SetThreadPriority
CompareStringW
LoadLibraryA
GlobalFindAtomW
GetVersionExA
SuspendThread
GlobalGetAtomNameW
GlobalAddAtomW
CompareStringA
lstrcmpW
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
SetLastError
LocalFree
FreeResource
MulDiv
CreateEventW
ResumeThread
SetEvent
ResetEvent
FormatMessageW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
InterlockedDecrement
GetModuleHandleA
GetModuleFileNameA
DeleteFileW
GetVersionExW
GetSystemInfo
IsDebuggerPresent
GetProcAddress
ExpandEnvironmentStringsW
GetFileAttributesA
CreateDirectoryW
GetModuleHandleW
GetTempPathW
GetTempFileNameW
SearchPathW
GetFileTime
SetFileTime
ReadFile
lstrcpynW
GetEnvironmentVariableW
lstrcpyW
GetFileSize
CreateFileMappingW
MapViewOfFile
lstrcmpiW
UnmapViewOfFile
WaitForMultipleObjects
GetExitCodeProcess
WaitForSingleObject
QueryPerformanceFrequency
QueryPerformanceCounter
GetLocaleInfoW
LoadLibraryW
FreeLibrary
CreateTimerQueueTimer
InterlockedExchangeAdd
InterlockedExchange
DeleteTimerQueueTimer
SetUnhandledExceptionFilter
GetModuleFileNameW
Sleep
GetCommandLineA
GetComputerNameW
GetSystemTime
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
CloseHandle
lstrlenW
GetVolumeInformationW
GetLastError
FindResourceW
user32
ReleaseDC
FillRect
ReleaseCapture
LoadIconW
SendMessageW
SetWindowLongW
ShowWindow
GetDC
CopyRect
SetRect
DefWindowProcW
CreateWindowExW
RegisterClassExW
LoadCursorW
RegisterWindowMessageW
GetMenuItemID
SetForegroundWindow
GetMenuState
GetSubMenu
GetMenuItemCount
IsMenu
LoadAcceleratorsW
TranslateAcceleratorW
GetCapture
PostMessageW
SetCursor
IsWindow
EnableWindow
IsWindowEnabled
GetWindow
GetDesktopWindow
GetWindowLongW
GetActiveWindow
GetWindowThreadProcessId
DestroyMenu
LoadMenuW
GetMenu
SetFocus
EndDialog
GetWindowRect
TranslateMessage
DispatchMessageW
PostQuitMessage
MessageBoxW
GetSysColor
EnumChildWindows
GetClassNameW
GetSystemMetrics
GetSystemMenu
EnableMenuItem
SetMenu
WinHelpW
MoveWindow
AppendMenuW
DestroyIcon
LoadImageW
CreateIconIndirect
LookupIconIdFromDirectoryEx
CreateIconFromResourceEx
PeekMessageW
ReuseDDElParam
UnpackDDElParam
GetKeyState
GetDlgCtrlID
SetWindowPos
GetDlgItem
EqualRect
BringWindowToTop
GetLastActivePopup
GetClassInfoW
MapDialogRect
TabbedTextOutW
InflateRect
PtInRect
IsRectEmpty
UnregisterClassW
RegisterClipboardFormatW
GetClipboardFormatNameW
GetClipboardFormatNameA
SetRectEmpty
SystemParametersInfoW
CharUpperW
CreateDialogIndirectParamW
ModifyMenuW
InsertMenuItemW
GetMenuItemInfoW
CheckMenuItem
DeleteMenu
CreatePopupMenu
GrayStringW
DrawTextExW
DrawTextW
DrawIcon
GetSysColorBrush
CharNextW
CopyAcceleratorTableW
MessageBeep
SetWindowTextW
IsDialogMessageW
PostThreadMessageW
SetWindowContextHelpId
GetForegroundWindow
GetNextDlgTabItem
GetNextDlgGroupItem
SetCapture
GetFocus
ShowOwnedPopups
IsWindowVisible
InvalidateRgn
InvalidateRect
UpdateWindow
GetWindowDC
EndPaint
BeginPaint
ClientToScreen
GetClassInfoExW
RegisterClassW
SendDlgItemMessageW
SendDlgItemMessageA
GetClientRect
MapWindowPoints
SetActiveWindow
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
IsChild
TrackPopupMenu
GetWindowTextLengthW
GetWindowTextW
DestroyWindow
GetClassLongW
SetPropW
UnhookWindowsHookEx
GetPropW
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetParent
CallNextHookEx
GetCursorPos
SetWindowsHookExW
ValidateRect
GetMenuCheckMarkDimensions
LoadBitmapW
SetMenuItemBitmaps
GetMessageW
advapi32
OpenThreadToken
RegQueryInfoKeyW
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
GetUserNameA
RegEnumKeyExW
RegDeleteKeyW
RevertToSelf
SetThreadToken
RegCreateKeyExW
RegOpenKeyW
RegEnumKeyW
RegQueryValueW
RegCreateKeyW
RegSetValueExW
ole32
StringFromGUID2
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StringFromCLSID
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoGetClassObject
CoRegisterMessageFilter
CoTaskMemFree
CoSetProxyBlanket
CreateStreamOnHGlobal
CoInitializeSecurity
CoInitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
StgOpenStorageOnILockBytes
shell32
ShellExecuteExW
SHChangeNotify
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
SHCreateDirectoryExW
SHBrowseForFolderW
DragQueryFileW
DragFinish
Shell_NotifyIconW
SHGetFolderPathW
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SafeArrayDestroy
SysStringLen
OleLoadPicture
SysAllocStringLen
VariantCopy
SysStringByteLen
SysAllocStringByteLen
SysAllocString
SysFreeString
VariantChangeType
VariantClear
VariantInit
shlwapi
StrStrIW
StrStrIA
PathFindFileNameW
PathFindExtensionW
UrlUnescapeW
PathIsUNCW
PathStripToRootW
gdi32
GetDeviceCaps
CreateCompatibleBitmap
DeleteDC
CreateHatchBrush
DeleteObject
CreateBitmap
CreateCompatibleDC
SelectObject
GetPixel
SetBkColor
ExtTextOutW
GetClipBox
SetTextColor
GetObjectW
GetStockObject
GetObjectType
CreatePen
CreatePatternBrush
CreateFontIndirectW
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetMapMode
GetViewportExtEx
GetWindowExtEx
BitBlt
PtVisible
RectVisible
TextOutW
GetTextExtentPoint32W
Escape
SaveDC
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
CreateSolidBrush
ExtSelectClipRgn
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
oledlg
OleUIBusyW
urlmon
URLDownloadToFileW
dbghelp
MiniDumpWriteDump
rpcrt4
UuidToStringA
UuidCreate
oleacc
LresultFromObject
CreateStdAccessibleObject
wininet
InternetGetLastResponseInfoW
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenUrlW
InternetQueryOptionW
InternetCanonicalizeUrlW
InternetCrackUrlW
HttpOpenRequestW
HttpAddRequestHeadersW
InternetSetOptionW
HttpSendRequestW
HttpQueryInfoW
HttpQueryInfoA
InternetReadFile
InternetConnectW
InternetOpenW
InternetCloseHandle
InternetQueryDataAvailable
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 217KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ