Static task
static1
Behavioral task
behavioral1
Sample
e7f5c1a1f0f2a71013052a628b6c844bdcd461c3394ef5ecfb62780fa971b782.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7f5c1a1f0f2a71013052a628b6c844bdcd461c3394ef5ecfb62780fa971b782.exe
Resource
win10v2004-20240426-en
General
-
Target
e7f5c1a1f0f2a71013052a628b6c844bdcd461c3394ef5ecfb62780fa971b782
-
Size
3.1MB
-
MD5
1643ed588da0b9c6d35f87af26ef1e42
-
SHA1
47c184fa3e556270448ca2815b5dd272a894ac71
-
SHA256
e7f5c1a1f0f2a71013052a628b6c844bdcd461c3394ef5ecfb62780fa971b782
-
SHA512
82187a38134f5ce43ca008012aff8fbdc0a33ef33d4bc9f41ea524bece7cd55d8b2c4526ad44371b26c270036ccf86c866718879d66c48bcb57d2ef34755832c
-
SSDEEP
49152:b2RZ8V+Ko0n20bJbMyIw4g2V/ar7DvGLORBSBnXhC39RgatnPLD35:b2zf9SvIwh21ar7DXBSBXhTaBF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e7f5c1a1f0f2a71013052a628b6c844bdcd461c3394ef5ecfb62780fa971b782
Files
-
e7f5c1a1f0f2a71013052a628b6c844bdcd461c3394ef5ecfb62780fa971b782.exe windows:5 windows x86 arch:x86
3c3cd22776cf337c3ceeace18e150bad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
_TrackMouseEvent
kernel32
GetLastError
GetLongPathNameW
GetModuleFileNameW
GetModuleHandleW
GetProcessHeap
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GlobalAlloc
GlobalLock
GlobalSize
GlobalUnlock
HeapAlloc
HeapCompact
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
HeapValidate
IsProcessorFeaturePresent
LocalFree
LockFile
GetFullPathNameW
MapViewOfFile
MoveFileW
MultiByteToWideChar
OutputDebugStringA
OutputDebugStringW
QueryPerformanceCounter
ReadFile
ResetEvent
SetConsoleScreenBufferSize
SetEndOfFile
SetEvent
SetFilePointer
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
UnhandledExceptionFilter
UnlockFileEx
UnmapViewOfFile
WaitForSingleObject
WaitForSingleObjectEx
WideCharToMultiByte
WriteFile
GetModuleHandleA
GetFullPathNameA
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceW
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetConsoleScreenBufferInfo
GetStartupInfoA
GetACP
FreeLibrary
FormatMessageW
FormatMessageA
FlushViewOfFile
FlushFileBuffers
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateMutexW
CreateFileW
CreateFileMappingW
CreateFileA
CreateEventW
CopyFileW
CloseHandle
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
GetProcAddress
LockFileEx
user32
KillTimer
IsZoomed
IsWindowVisible
IsClipboardFormatAvailable
IsChild
InvalidateRect
InsertMenuW
InflateRect
GetWindowRect
GetSystemMetrics
GetSysColor
GetSubMenu
GetParent
GetKeyState
GetFocus
LoadBitmapW
GetDesktopWindow
GetDC
GetClipboardData
GetClientRect
GetAsyncKeyState
EnableWindow
EmptyClipboard
DrawFocusRect
DrawEdge
DefWindowProcW
CreatePopupMenu
CopyRect
CloseClipboard
ClipCursor
ClientToScreen
LoadCursorW
LoadMenuW
LoadStringW
MessageBeep
ModifyMenuW
OffsetRect
PostMessageW
OpenClipboard
PtInRect
RedrawWindow
RegisterClipboardFormatW
UpdateWindow
SetTimer
SetRectEmpty
SetFocus
SetCursor
SetClipboardData
SetCapture
SendMessageW
ScreenToClient
ReleaseCapture
GetDlgItem
RegisterWindowMessageW
BringWindowToTop
GetCursorPos
gdi32
CreatePolygonRgn
CreateSolidBrush
DeleteDC
DeleteObject
Ellipse
ExtCreatePen
ExtTextOutW
FillRgn
GetCharABCWidthsW
GetDeviceCaps
GetEnhMetaFileBits
GetEnhMetaFileHeader
GetObjectW
CreatePen
GetTextMetricsW
ModifyWorldTransform
PlayEnhMetaFile
PlgBlt
PolyBezier
Polyline
PtInRegion
Rectangle
RoundRect
SetBrushOrgEx
SetEnhMetaFileBits
SetGraphicsMode
SetPixel
SetWorldTransform
StretchDIBits
CreatePalette
CreateFontW
CreateFontIndirectW
CreateEnhMetaFileW
CreateDIBSection
GetTextExtentPoint32W
CreateCompatibleDC
advapi32
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
shell32
ShellExecuteW
DragAcceptFiles
shlwapi
PathAppendW
PathCombineW
PathRelativePathToW
PathRemoveFileSpecW
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_media_9 Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_stat_9 Size: 799KB - Virtual size: 800KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE