Static task
static1
Behavioral task
behavioral1
Sample
7a3d6fd3ff2ab1c1101cc4a3b6e61240N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7a3d6fd3ff2ab1c1101cc4a3b6e61240N.exe
Resource
win10v2004-20240709-en
General
-
Target
7a3d6fd3ff2ab1c1101cc4a3b6e61240N.exe
-
Size
573KB
-
MD5
7a3d6fd3ff2ab1c1101cc4a3b6e61240
-
SHA1
b5f2ab1b00521ba9e86f046d80488e2871bc108f
-
SHA256
c8cb6c9ea8541be84ffc6b4abb89a62dfa84f6432dbe8ab3bd1a2d7006b64a26
-
SHA512
bbecb752c1d66f3158a98444590a898e0e2335c48bede312fbe6e9fc160cfce299572880a2829c7698ba8c9458f1fa481c7cb95d66600a87999ad4f706a2dcfb
-
SSDEEP
12288:Haj/nJ0Tumj7P1QbiLIxcPUreCRSw0FIVuaPMcUUXbSJ9Otu:HPj7PWiSiCwCVP2Jktu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7a3d6fd3ff2ab1c1101cc4a3b6e61240N.exe
Files
-
7a3d6fd3ff2ab1c1101cc4a3b6e61240N.exe.exe windows:4 windows x86 arch:x86
aab9c76df0519bcf51c0163279c5f6b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetMiterLimit
UpdateColors
GetGlyphOutlineA
PatBlt
SetDIBColorTable
SetMetaFileBitsEx
Rectangle
SetLayout
GetBitmapDimensionEx
CloseEnhMetaFile
SetPolyFillMode
OffsetRgn
PlayMetaFile
SetPixelFormat
CreateDiscardableBitmap
GetPaletteEntries
ExtCreatePen
SetBitmapBits
CopyEnhMetaFileA
CopyMetaFileA
GetTextAlign
StartPage
wininet
InternetWriteFileExW
GopherCreateLocatorA
InternetTimeFromSystemTimeA
SetUrlCacheEntryGroupA
FindFirstUrlCacheEntryExA
GopherFindFirstFileA
InternetGetCookieW
shell32
ShellExecuteExA
SHFileOperationW
CommandLineToArgvW
SheSetCurDrive
ShellExecuteW
kernel32
SetEndOfFile
GetFileType
LoadLibraryA
GetEnvironmentStrings
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
IsDebuggerPresent
WriteFile
GetCurrentThreadId
MoveFileW
EnumSystemLocalesA
GetCurrencyFormatA
GetDateFormatA
GetLocaleInfoW
OpenWaitableTimerW
SetLocaleInfoW
GetTimeZoneInformation
QueryPerformanceCounter
GetStdHandle
GetLocaleInfoA
LCMapStringW
WriteConsoleInputW
DeleteCriticalSection
FreeEnvironmentStringsW
GetCurrentThread
FileTimeToDosDateTime
CompareFileTime
GetTempFileNameA
GetCompressedFileSizeA
InitializeCriticalSectionAndSpinCount
GetOEMCP
CloseHandle
SetFilePointer
GetCommandLineA
WriteFileEx
GlobalLock
GetStringTypeA
GetThreadPriorityBoost
GetModuleHandleA
TlsSetValue
GetStartupInfoA
GetCurrentProcess
SetLastError
IsValidCodePage
GetModuleFileNameA
Sleep
EnumDateFormatsA
GetConsoleOutputCP
VirtualQuery
FlushFileBuffers
InterlockedDecrement
HeapCreate
HeapFree
CompareStringA
GetProcAddress
GetTickCount
SetStdHandle
WriteConsoleA
OpenMutexA
GetTimeFormatA
SetConsoleMode
SetEnvironmentVariableA
FindAtomW
ReadFile
TlsGetValue
EnumCalendarInfoExA
EnterCriticalSection
GetConsoleCP
MultiByteToWideChar
CompareStringW
GetACP
GetStringTypeW
HeapDestroy
GetCPInfo
FreeLibrary
WriteConsoleW
GetEnvironmentStringsW
GetConsoleMode
ExitProcess
HeapAlloc
GetModuleHandleW
GetLastError
HeapReAlloc
GetVersionExA
RtlUnwind
InterlockedIncrement
UnhandledExceptionFilter
CreateFileA
UnmapViewOfFile
IsValidLocale
LeaveCriticalSection
HeapSize
TerminateProcess
CreateMutexA
GetUserDefaultLCID
InterlockedExchange
LCMapStringA
GetCurrentProcessId
GlobalFree
SetHandleCount
GetDiskFreeSpaceW
SetConsoleCtrlHandler
TlsAlloc
WideCharToMultiByte
VirtualFree
TlsFree
GetSystemTimeAsFileTime
VirtualAlloc
comctl32
InitCommonControlsEx
advapi32
RegConnectRegistryW
CryptSetProviderA
CreateServiceW
StartServiceA
RegCloseKey
InitializeSecurityDescriptor
RegQueryMultipleValuesA
LookupPrivilegeDisplayNameW
LookupSecurityDescriptorPartsA
CryptGetDefaultProviderW
RegQueryInfoKeyW
LookupAccountSidW
DuplicateTokenEx
RegOpenKeyA
RegOpenKeyW
InitiateSystemShutdownW
AbortSystemShutdownA
RegCreateKeyExW
LookupPrivilegeValueW
CryptDuplicateKey
RegDeleteKeyA
user32
CharLowerBuffA
DrawMenuBar
CharPrevW
RegisterClassA
GetWindowModuleFileNameW
RealChildWindowFromPoint
GetSubMenu
GetWindowLongA
SetWindowsHookExA
ChangeMenuA
LockWindowUpdate
RegisterClassExA
Sections
.text Size: 418KB - Virtual size: 417KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ