Static task
static1
Behavioral task
behavioral1
Sample
7c08c19e99ebd75fcc2007c0a6a5d10e0deb020fedbe34dbcf381bf2ab186eac.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7c08c19e99ebd75fcc2007c0a6a5d10e0deb020fedbe34dbcf381bf2ab186eac.exe
Resource
win10v2004-20240802-en
General
-
Target
7c08c19e99ebd75fcc2007c0a6a5d10e0deb020fedbe34dbcf381bf2ab186eac
-
Size
4.8MB
-
MD5
ce8145862a97c6ad18d5d31ffa515a85
-
SHA1
dba9fc6682646dcba99fc021e98462612973376e
-
SHA256
7c08c19e99ebd75fcc2007c0a6a5d10e0deb020fedbe34dbcf381bf2ab186eac
-
SHA512
10d8312779f5bc36508320a94236915d0df8da025f51bccf43a6ead6d6c993d7d10bc4c25f324d797893d17637485cea82ef576242f48ce94725f0f90b2ea561
-
SSDEEP
98304:e5BvWB6rjo6CvcgcNWRrDoWh1zgGfvSKIRuLS7ksX:cBvWB76C1cNWac2GjLSAsX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c08c19e99ebd75fcc2007c0a6a5d10e0deb020fedbe34dbcf381bf2ab186eac
Files
-
7c08c19e99ebd75fcc2007c0a6a5d10e0deb020fedbe34dbcf381bf2ab186eac.exe windows:5 windows x86 arch:x86
5da6fe4c8eb8d0fe49edb2448f058d32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawEx
ImageList_EndDrag
ImageList_GetBkColor
ImageList_GetDragImage
ImageList_GetIconSize
ImageList_GetImageCount
ImageList_Read
ImageList_DragShowNolock
ImageList_Replace
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_SetIconSize
ImageList_Write
ord17
ImageList_DragMove
ImageList_DragLeave
ImageList_DragEnter
ImageList_Destroy
ImageList_Create
ImageList_Remove
ImageList_BeginDrag
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
lstrcpynA
lstrlenA
MulDiv
MultiByteToWideChar
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
lstrcpyA
SetFileAttributesA
SetFilePointer
SetFileTime
SetLastError
SetThreadLocale
SizeofResource
Sleep
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
HeapReAlloc
HeapAlloc
GetOEMCP
HeapFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetCurrentProcess
TerminateProcess
RtlUnwind
lstrcmpA
LockResource
LocalFree
LocalAlloc
LoadResource
LoadLibraryExA
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
GlobalUnlock
GlobalReAlloc
GlobalMemoryStatus
GlobalLock
GlobalHandle
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetSystemInfo
GetSystemDirectoryA
GetStringTypeExA
GetStdHandle
GetStartupInfoA
GetProfileStringA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsA
GetLocalTime
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileAttributesA
GetExitCodeThread
GetEnvironmentStrings
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentProcessId
GetCurrentDirectoryA
GetCPInfo
GetACP
FreeResource
FreeLibrary
FreeEnvironmentStringsA
FormatMessageA
FindResourceA
FindNextChangeNotification
FindFirstFileA
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnumCalendarInfoA
DosDateTimeToFileTime
DeviceIoControl
DeleteFileA
DeleteCriticalSection
CreateThread
CreateMutexA
LCMapStringW
CreateFileA
CreateEventA
CreateDirectoryA
CompareStringW
CompareStringA
CreateProcessA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
LoadLibraryA
RaiseException
GetCommandLineA
GetVersion
GetThreadLocale
GetCurrentThreadId
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEvent
user32
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TabbedTextOutA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WaitMessage
WindowFromPoint
WinHelpA
wvsprintfA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsRectEmpty
IsIconic
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetUpdateRect
GetTopWindow
GetSystemMetrics
RegisterClassA
GetSysColorBrush
PostQuitMessage
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetMessagePos
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardType
GetKeyboardState
GetKeyboardLayoutList
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EnumClipboardFormats
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
MessageBoxA
AdjustWindowRectEx
BeginPaint
CallNextHookEx
CallWindowProcA
CharLowerA
CharLowerBuffA
CharNextA
CharToOemA
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
RedrawWindow
GetSystemMenu
PtInRect
CharUpperBuffA
CheckMenuItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
PostMessageA
PeekMessageA
OpenClipboard
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBeep
MapWindowPoints
MapVirtualKeyA
LoadStringA
GetSubMenu
LoadKeyboardLayoutA
GetWindowDC
gdi32
CreateFontIndirectA
CreateHalftonePalette
CreateICA
CreatePalette
CreatePenIndirect
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteEnhMetaFile
DeleteObject
Ellipse
EndDoc
EndPage
ExcludeClipRect
ExtFloodFill
ExtTextOutA
GdiFlush
GetBitmapBits
GetBkColor
GetClipBox
GetCurrentPositionEx
GetDCOrgEx
GetDeviceCaps
GetDIBColorTable
GetDIBits
CreateDIBSection
GetEnhMetaFileHeader
GetEnhMetaFilePaletteEntries
GetObjectA
GetPaletteEntries
GetPixel
GetStockObject
GetSystemPaletteEntries
GetTextExtentPoint32A
GetTextExtentPointA
GetTextMetricsA
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
MaskBlt
MoveToEx
PatBlt
PlayEnhMetaFile
Polyline
RealizePalette
Rectangle
RectVisible
RestoreDC
RoundRect
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetAbortProc
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetMapMode
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocA
StartPage
StretchBlt
UnrealizeObject
CreateDIBitmap
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
GetEnhMetaFileBits
CopyEnhMetaFileA
winspool.drv
EnumPrintersA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
GetSaveFileNameA
ChooseFontA
GetOpenFileNameA
advapi32
RegCreateKeyExA
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExA
ole32
CoInitialize
CoTaskMemAlloc
CoUninitialize
OleInitialize
OleUninitialize
CoCreateInstance
oleaut32
VariantCopy
VariantChangeType
SysReAllocStringLen
SysFreeString
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantInit
VariantClear
Sections
.text Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vga7 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE