Static task
static1
Behavioral task
behavioral1
Sample
7fb855a7a2d4a2e2be9c1b6a1a87ca57aa8fc927df628d48be54156661de70a5.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7fb855a7a2d4a2e2be9c1b6a1a87ca57aa8fc927df628d48be54156661de70a5.dll
Resource
win10v2004-20240709-en
General
-
Target
7fb855a7a2d4a2e2be9c1b6a1a87ca57aa8fc927df628d48be54156661de70a5.7z
-
Size
154KB
-
MD5
a3d7094c9a4eaa9fec77f8f5c8fb89dd
-
SHA1
730301b8ed318f38a06c831f1686dd57887f035a
-
SHA256
4141d9da7d986d71998c364d30906f16e4ada68577fbb395c5ed23b70792c13c
-
SHA512
388e602aa3c5ab6c9ef684feef3d78c72cff962792181ecfc5e8633b46e0afc8e5d2fb9f37167de8e75d7bb37c55926c91c137454b1e890f9d7c0aa5a22679ef
-
SSDEEP
3072:w317Dd3kr/IUcXI9ME0v5xBpTijiIXMD0w8uMca6utM9Ae:4UrNc7EEs524yqe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7fb855a7a2d4a2e2be9c1b6a1a87ca57aa8fc927df628d48be54156661de70a5
Files
-
7fb855a7a2d4a2e2be9c1b6a1a87ca57aa8fc927df628d48be54156661de70a5.7z.7z
Password: infected
-
7fb855a7a2d4a2e2be9c1b6a1a87ca57aa8fc927df628d48be54156661de70a5.dll windows:4 windows x86 arch:x86
49895fb59ace3671cfd8674889932dd1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
InterlockedDecrement
InterlockedExchangeAdd
GetProcAddress
GetUserDefaultLCID
GetSystemTimeAsFileTime
VirtualAlloc
VirtualProtect
VirtualQuery
GetTickCount
IsBadWritePtr
IsBadCodePtr
IsDBCSLeadByte
GetACP
Sleep
QueryPerformanceCounter
GetComputerNameA
GetProcessHeap
GetCurrentProcess
user32
GetCursor
IsWindowUnicode
GetMenuContextHelpId
GetWindowRect
IsCharLowerA
GetWindowRgn
WindowFromDC
GetDlgItem
GetTitleBarInfo
GetWindow
GetWindowInfo
GetWindowThreadProcessId
IsZoomed
IsIconic
GetGUIThreadInfo
GetWindowPlacement
IsChild
IsMenu
SetLastErrorEx
InSendMessage
advapi32
IsValidSecurityDescriptor
InitializeSecurityDescriptor
IsValidAcl
msvcrt
_adjust_fdiv
malloc
_initterm
free
memmove
_memicmp
memchr
_swab
_memccpy
_CIasin
_set_error_mode
_CIpow
_CItanh
frexp
_pctype
_isctype
_hypot
ceil
__mb_cur_max
modf
_errno
_ltoa
rand
_CIfmod
gdi32
GetPixel
GdiGetBatchLimit
GetROP2
GetBitmapDimensionEx
shell32
DuplicateIcon
ord66
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ