Static task
static1
Behavioral task
behavioral1
Sample
0a7eba696620d6de82432f7e3df22912e69ee7ed838b06161e1edd7f02dbff7a.exe
Resource
win7-20240903-en
General
-
Target
0a7eba696620d6de82432f7e3df22912e69ee7ed838b06161e1edd7f02dbff7a.exe
-
Size
3.3MB
-
MD5
f684dd05c47cc64331be2dcecb9f426e
-
SHA1
851a19c1d55595ce35cded5e1d41db4abf6ce448
-
SHA256
0a7eba696620d6de82432f7e3df22912e69ee7ed838b06161e1edd7f02dbff7a
-
SHA512
53b63d6ca1bb3682f2f68973f2151e07cd0e27f73d659c55c5e4bea2d407641a2be6e2fdb19720149afe5713e35dc7cd6c0f1041bc3ff452241c1a770bc73b42
-
SSDEEP
49152:zira8kCZ9x7YAJkst8Cqop+hyTSnzHojs9SqhntIDF9NE5oc2AzjvZ0yCq:zira8kCZD7x7t8CxpWbnsoRntsjHyCq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7eba696620d6de82432f7e3df22912e69ee7ed838b06161e1edd7f02dbff7a.exe
Files
-
0a7eba696620d6de82432f7e3df22912e69ee7ed838b06161e1edd7f02dbff7a.exe.exe windows:4 windows x86 arch:x86
4b50d77de65ed9b541e27c30a2eba7fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FindResourceExA
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
RtlUnwind
GetSystemTimeAsFileTime
RaiseException
GetFileInformationByHandle
DuplicateHandle
GetFileType
ExitProcess
GetTimeFormatA
GetDateFormatA
VirtualAlloc
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetTimeZoneInformation
SetHandleCount
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
VirtualProtect
GetModuleFileNameW
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
LoadLibraryA
lstrcmpW
MulDiv
GlobalUnlock
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomA
SuspendThread
SetEvent
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryExA
GlobalLock
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
CompareStringA
CompareStringW
InterlockedExchange
GetVersion
CreateEventA
WaitForSingleObject
WritePrivateProfileStringA
GlobalAlloc
GlobalFree
SetFileAttributesA
FindFirstFileA
MoveFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
GetVersionExA
CreateFileA
DeviceIoControl
GetLastError
CloseHandle
MultiByteToWideChar
InterlockedDecrement
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
lstrlenA
ResumeThread
GetExitCodeThread
Sleep
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetWindowsDirectoryA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
PeekNamedPipe
user32
DestroyMenu
GetAsyncKeyState
MapDialogRect
GetSysColorBrush
UnregisterClassA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
SetScrollInfo
PtInRect
SetWindowPlacement
DefWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSysColor
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperA
KillTimer
SetTimer
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
UpdateWindow
LoadCursorA
CopyIcon
InvalidateRect
GetDC
GetDlgCtrlID
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDlgItemTextA
BeginPaint
EndPaint
ReleaseDC
PostMessageA
LoadIconA
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
EnableWindow
RedrawWindow
GetWindowRect
GetSystemMetrics
SetDlgItemTextA
GetParent
SendMessageA
MessageBoxA
SetSystemCursor
CallWindowProcA
TabbedTextOutA
gdi32
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
SetBkMode
GetDeviceCaps
EnumFontFamiliesExA
GetObjectA
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CreateCompatibleDC
CreateDIBitmap
SelectObject
SetStretchBltMode
StretchBlt
DeleteObject
CreateFontA
CreateSolidBrush
GetClipBox
SetMapMode
SetTextColor
PtVisible
comdlg32
GetFileTitleA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
shlwapi
PathRemoveExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
PathFindExtensionA
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
SysAllocString
VariantInit
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysStringLen
SysAllocStringLen
VariantClear
SysFreeString
Sections
.text Size: 1.9MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 476KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 884KB - Virtual size: 883KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ