C:\TeamcityAgent\work\995f31b5fe251319\spa\unpacker\bin\Release_Win32\7z.pdb
Static task
static1
Behavioral task
behavioral1
Sample
89ef40ab0ab71210a73390b154fab30007fe9500d348420985e65521393afa1a.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89ef40ab0ab71210a73390b154fab30007fe9500d348420985e65521393afa1a.dll
Resource
win10v2004-20240802-en
General
-
Target
89ef40ab0ab71210a73390b154fab30007fe9500d348420985e65521393afa1a
-
Size
1.5MB
-
MD5
8d730fa4cde62733b108446cb880caac
-
SHA1
f52e8816e1a7e31dff2e9f35c91c74b6b2276abc
-
SHA256
89ef40ab0ab71210a73390b154fab30007fe9500d348420985e65521393afa1a
-
SHA512
e4c5c4029eddc5ca99e625606effc35ad2ec0965a7a456659db5e8aec8bed485f99dd8c8762bc2dd4c37564bfbf4d74fcf2b946df61c8812795db19bfa2bbf46
-
SSDEEP
49152:RggggM9EmMJGA70NQ0tR2ftVT2mzfjN9D5w8Me+7EP297DnMp:uyJGAAS0MbT2mzLN9D5w8M19
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89ef40ab0ab71210a73390b154fab30007fe9500d348420985e65521393afa1a
Files
-
89ef40ab0ab71210a73390b154fab30007fe9500d348420985e65521393afa1a.dll windows:5 windows x86 arch:x86
d4e0b412f8dbb0ccd1858ab6033a13d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetProcAddress
VirtualAlloc
VirtualFree
GetModuleHandleW
GetVersionExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
GetLastError
InitializeCriticalSection
SetEvent
ResetEvent
ReleaseSemaphore
WaitForSingleObject
CloseHandle
CreateEventW
CreateSemaphoreW
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcessId
GetCurrentThreadId
SetLastError
SetFileTime
GetTickCount
GetSystemDirectoryW
GetTempPathW
GetWindowsDirectoryW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
RemoveDirectoryW
CreateFileW
SetFileAttributesW
DeleteFileW
MoveFileW
FindClose
GetLogicalDriveStringsW
GetModuleHandleA
GetFileAttributesW
FindFirstFileW
FindNextFileW
FindFirstChangeNotificationW
FindCloseChangeNotification
GetFileSize
WriteFile
ReadFile
SetEndOfFile
SetFilePointer
CompareFileTime
GlobalMemoryStatus
GetProcessAffinityMask
GetCurrentProcess
GetSystemInfo
GetSystemTimeAsFileTime
FileTimeToDosDateTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
FileTimeToLocalFileTime
WaitForMultipleObjects
FreeLibrary
LoadLibraryW
QueryPerformanceCounter
DecodePointer
InterlockedDecrement
RaiseException
InitializeCriticalSectionAndSpinCount
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
OutputDebugStringA
GetStringTypeW
HeapSize
SetConsoleCtrlHandler
GetFileType
GetStdHandle
GetProcessHeap
SetEnvironmentVariableW
WriteConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
OutputDebugStringW
LocalFree
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
CreateThread
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetModuleFileNameW
HeapFree
HeapAlloc
GetCurrentThread
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
FindFirstFileExA
FindFirstFileExW
FindNextFileA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
user32
CharPrevExA
CharUpperW
UnregisterClassW
oleaut32
SysAllocStringByteLen
SysFreeString
VariantCopy
VariantClear
SysAllocStringLen
SysAllocString
GetErrorInfo
VariantInit
VariantChangeType
SetErrorInfo
SysStringByteLen
SysStringLen
CreateErrorInfo
Exports
Exports
CreateDecoder
CreateEncoder
CreateObject
GetHandlerProperty
GetHandlerProperty2
GetHashers
GetIsArc
GetMethodProperty
GetMsDocType
GetNumberOfFormats
GetNumberOfMethods
SetCaseSensitive
SetCodecs
SetLargePageMode
UnpackStream
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ