Static task
static1
Behavioral task
behavioral1
Sample
7e560d8f3edde8327240686e56d943a0f4fd36f67c83f0c558cb8ceb244af974.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e560d8f3edde8327240686e56d943a0f4fd36f67c83f0c558cb8ceb244af974.exe
Resource
win10v2004-20240508-en
General
-
Target
7e560d8f3edde8327240686e56d943a0f4fd36f67c83f0c558cb8ceb244af974
-
Size
425KB
-
MD5
0ec53273c742cb2725e474617e222871
-
SHA1
63e8c98945e97a4dcb588a10cef3cef95c0facb7
-
SHA256
7e560d8f3edde8327240686e56d943a0f4fd36f67c83f0c558cb8ceb244af974
-
SHA512
c7796003e4c8771e345693a6b3fb6e9c696fb789e339a0967f1b23046861516d0abb0040df9bb60628fb4b684c68054f35a06e6315d9d0992c2333b018f6a2c1
-
SSDEEP
6144:FDaKdV9S0zdXMPRdVLAloxKbgvRSuSObviuDN2L0fqYdnvDyAv+EW:FDF9XzVMPRdVjxK2QuSeieU0fqonI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e560d8f3edde8327240686e56d943a0f4fd36f67c83f0c558cb8ceb244af974
Files
-
7e560d8f3edde8327240686e56d943a0f4fd36f67c83f0c558cb8ceb244af974.exe windows:5 windows x86 arch:x86
dcf71cf9143ab62466fb11500acac90a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessShutdownParameters
CreateThread
ResetEvent
ExitProcess
EnterCriticalSection
TerminateThread
LeaveCriticalSection
GetCurrentThreadId
WaitForMultipleObjects
GetStdHandle
ReadFile
GetFileSize
GetCommandLineW
CreatePipe
SetEvent
ExitThread
GetModuleHandleW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrlenW
GetTempPathW
LoadLibraryW
GetProcAddress
GetCurrentProcess
GetFullPathNameW
GetLongPathNameW
GetModuleFileNameW
GetFileInformationByHandle
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
Process32NextW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
GetVersion
VirtualAlloc
HeapCreate
CreateEventW
HeapAlloc
InterlockedCompareExchange
InterlockedExchange
DeleteCriticalSection
MoveFileExW
CreateFileA
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoW
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
HeapReAlloc
VirtualFree
InitializeCriticalSection
SetUnhandledExceptionFilter
SetErrorMode
GetTickCount
WaitForSingleObject
CreateProcessW
SetFileAttributesW
DeleteFileW
LoadLibraryA
CopyFileW
GetModuleFileNameA
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
LocalFree
GetStringTypeW
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
RaiseException
GetStartupInfoW
WriteFile
Sleep
GetSystemInfo
GetLastError
GetDiskFreeSpaceExW
GetDriveTypeW
GetLogicalDriveStringsW
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
CloseHandle
GetFileTime
CreateFileW
GetVersionExW
GetVolumeInformationW
GetVolumePathNameW
GetSystemDirectoryW
InterlockedDecrement
HeapFree
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
InterlockedIncrement
user32
SetFocus
GetSysColor
SendMessageW
SetTimer
EnableWindow
GetForegroundWindow
LoadImageW
LoadIconW
FlashWindow
AttachThreadInput
SetCursor
CharLowerW
GetSystemMetrics
RedrawWindow
MessageBoxW
BeginPaint
EndPaint
DefWindowProcW
ShowWindow
DestroyWindow
PostMessageW
KillTimer
LoadCursorW
SetRect
DrawIconEx
GetSysColorBrush
RegisterClassExW
AdjustWindowRectEx
CreateWindowExW
SetParent
GetMessageW
IsDialogMessageW
TranslateMessage
DispatchMessageW
SetWindowTextW
GetWindowLongW
SetWindowPos
PostQuitMessage
SetWindowLongW
gdi32
GetStockObject
GetObjectW
SelectObject
CreateBitmap
CreateCompatibleDC
BitBlt
SetDIBitsToDevice
CreateFontIndirectW
gdiplus
GdiplusShutdown
GdiplusStartup
GdipGetImageWidth
GdipLoadImageFromStream
GdipDrawImageRectI
GdipFillRectangleI
GdipGetImageHeight
GdipCreateFromHDC
GdipDisposeImage
GdipCreateSolidFill
GdipDeleteBrush
GdipDeleteGraphics
shlwapi
StrCpyW
PathCreateFromUrlW
AssocQueryStringW
comctl32
InitCommonControlsEx
comdlg32
GetSaveFileNameW
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CryptGenRandom
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
RegEnumKeyExW
shell32
ShellExecuteW
ord190
ord680
ord155
SHOpenFolderAndSelectItems
SHGetFolderPathW
ole32
OleSetContainedObject
OleCreate
OleLockRunning
CoInitializeEx
CoCreateInstance
CoUninitialize
CoSetProxyBlanket
CoTaskMemFree
GetHGlobalFromStream
CreateStreamOnHGlobal
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
wininet
HttpOpenRequestW
HttpSendRequestW
InternetQueryOptionW
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetConnectW
InternetSetOptionW
InternetOpenW
HttpQueryInfoA
powrprof
CallNtPowerInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetModuleFileNameExW
Sections
.text Size: 294KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ