s:\tools\bin\ReleaseTools\7zS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
527fade444aa3bd2677ed89040a898ded5e2b99862ac72290e47183b59ba3aa2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
527fade444aa3bd2677ed89040a898ded5e2b99862ac72290e47183b59ba3aa2.exe
Resource
win10v2004-20240802-en
General
-
Target
527fade444aa3bd2677ed89040a898ded5e2b99862ac72290e47183b59ba3aa2
-
Size
458KB
-
MD5
950023115a0cc71bd6dc7b658d6c2829
-
SHA1
ff76e1a51acc2af5165fc3b8ab0933a20472ce29
-
SHA256
527fade444aa3bd2677ed89040a898ded5e2b99862ac72290e47183b59ba3aa2
-
SHA512
5f300c951368b678de14241b2088dfe35b3aae6346c04846515f7594575b63aabb1bf0e891f058b5bf4b22322385afc76b48a7f12310477e2d48f3625e9f0d18
-
SSDEEP
6144:+EKGSmLhzAODEVKBOneQ0umvNwDMLXjGtdA6BJe:cAhzAODEVKBOneQ0PvNwDOCV+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 527fade444aa3bd2677ed89040a898ded5e2b99862ac72290e47183b59ba3aa2
Files
-
527fade444aa3bd2677ed89040a898ded5e2b99862ac72290e47183b59ba3aa2.exe windows:4 windows x86 arch:x86
5f45a271f53a302fbfe184710e981adf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ord17
kernel32
WaitForSingleObject
SetEvent
ResetEvent
WaitForMultipleObjects
VirtualAlloc
VirtualFree
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
LoadLibraryExW
LoadLibraryW
GetModuleFileNameA
GetModuleFileNameW
LocalFree
FormatMessageA
FormatMessageW
SetFileAttributesA
MoveFileA
RemoveDirectoryA
SetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetSystemDirectoryA
GetWindowsDirectoryW
GetSystemDirectoryW
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryW
DeleteFileW
GetShortPathNameA
lstrlenA
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryW
SearchPathA
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
GetFullPathNameW
SearchPathW
FindClose
FindCloseChangeNotification
FindFirstChangeNotificationA
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindFirstChangeNotificationW
GetLogicalDriveStringsA
GetLogicalDriveStringsW
CreateFileA
GetFileSize
CreateThread
GetFileInformationByHandle
ReadFile
SetFileTime
WriteFile
SetEndOfFile
CreateFileW
CompareFileTime
CreateEventA
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLangID
EnumResourceLanguagesA
GetUserDefaultUILanguage
GetVersionExA
Sleep
SetLastError
DuplicateHandle
GetCurrentProcess
GetEnvironmentVariableW
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetExitCodeProcess
CreateProcessA
GetCommandLineW
CompareStringW
CompareStringA
FlushFileBuffers
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
IsValidCodePage
SetEnvironmentVariableA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
GetLocaleInfoW
GetLocaleInfoA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
InterlockedExchange
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
SetFilePointer
SetConsoleCtrlHandler
HeapSize
HeapCreate
HeapDestroy
HeapReAlloc
FatalAppExitA
GetCurrentThread
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TlsGetValue
user32
CharPrevExA
CharLowerA
CharUpperA
DestroyWindow
PostMessageA
ShowWindow
EndDialog
KillTimer
SetTimer
SendMessageA
GetDlgItem
MessageBoxW
DialogBoxParamW
CreateDialogParamW
DialogBoxParamA
CreateDialogParamA
GetWindowLongA
SetWindowLongA
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
SetWindowTextA
CreateWindowExW
RegisterClassW
RegisterClassA
GetWindowTextA
GetWindowTextLengthA
CreateWindowExA
LoadStringA
CharPrevA
CharNextA
CharToOemA
CharLowerW
CharUpperW
LoadStringW
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
SHCreateDirectoryExW
SHGetPathFromIDListW
SHCreateDirectoryExA
ShellExecuteExA
SHBrowseForFolderW
ole32
OleInitialize
CoTaskMemFree
oleaut32
SysAllocString
VariantCopy
VariantClear
Sections
.text Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 102KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE