Static task
static1
Behavioral task
behavioral1
Sample
7b8190425cea4889d359295b38739553f8803143e6c25c426ac7a8ff339e7429.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7b8190425cea4889d359295b38739553f8803143e6c25c426ac7a8ff339e7429.exe
Resource
win10v2004-20240802-en
General
-
Target
7b8190425cea4889d359295b38739553f8803143e6c25c426ac7a8ff339e7429
-
Size
204KB
-
MD5
28de42e0b8bdf7843f89fd5441bb3aac
-
SHA1
5a3608dbcea80e8f5b20ddac5564059857db1e51
-
SHA256
7b8190425cea4889d359295b38739553f8803143e6c25c426ac7a8ff339e7429
-
SHA512
c59a8f311eef5c9edae1be869690e58f96ab1a673872c4776e1c3214fbd18600d9f12acc4f7096d57bf9658ddac7209b85c75390a234cf533aeec0216054d162
-
SSDEEP
3072:gdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFU/:SGazIc6TVBMrOpzeJEsuirSGEMpgE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b8190425cea4889d359295b38739553f8803143e6c25c426ac7a8ff339e7429
Files
-
7b8190425cea4889d359295b38739553f8803143e6c25c426ac7a8ff339e7429.exe windows:4 windows x86 arch:x86
e12f72e7fe59535708698b4de0340a02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetWindowsDirectoryW
SetErrorMode
CreateFileMappingA
GetComputerNameA
QueryPerformanceCounter
GetModuleFileNameA
SetPriorityClass
lstrcpyn
GetFileType
InitializeCriticalSection
GetLogicalDrives
GetProcessHeap
GetNumberFormatA
LocalAlloc
CreateEventW
GetTimeFormatA
GetVersionExW
GetProcessHeaps
CopyFileExW
GetHandleInformation
GlobalGetAtomNameA
FlushFileBuffers
CreateNamedPipeW
CopyFileA
GetCurrentDirectoryA
OpenWaitableTimerW
GetCommandLineW
lstrlen
CopyFileExA
FreeLibrary
SetComputerNameW
GetProcAddress
EnumCalendarInfoA
FindAtomA
GetModuleHandleW
CreatePipe
OpenProcess
CreateMailslotW
BeginUpdateResourceW
IsDebuggerPresent
GetVersionExA
GetEnvironmentStringsW
GetModuleHandleA
user32
GetSysColorBrush
RegisterClassExW
GetWindowLongA
SetMenu
ArrangeIconicWindows
DialogBoxParamW
LoadIconW
CreateIcon
CharNextA
GetMessageW
LoadImageA
TrackPopupMenuEx
mouse_event
GetParent
OpenClipboard
LoadIconW
GetIconInfo
CheckRadioButton
GetIconInfo
GetWindowTextW
OffsetRect
SetWindowPos
GetMenuStringW
CopyRect
EnumWindows
SetFocus
SetDlgItemInt
GetSystemMetrics
GetWindowTextLengthA
GetCapture
GetMenuItemCount
EnumDesktopsA
DestroyCursor
GetClassInfoExA
UpdateLayeredWindow
MonitorFromWindow
FrameRect
EnumChildWindows
FindWindowA
LoadBitmapW
RegisterClassExA
CloseWindow
IsMenu
MessageBeep
AdjustWindowRect
EnumDesktopWindows
DeleteMenu
MonitorFromRect
IsWindow
gdi32
ExtFloodFill
ExtEscape
EqualRgn
CopyEnhMetaFileW
SetPixelFormat
ResetDCW
CreatePolygonRgn
CreateDCA
SetTextJustification
GetKerningPairsA
GetDCPenColor
SetPaletteEntries
AbortPath
CreatePolyPolygonRgn
GetBkMode
advapi32
RegOpenKeyA
RegQueryValueW
RegReplaceKeyW
RegCreateKeyExW
RegRestoreKeyA
oleaut32
CreateDispTypeInfo
opengl32
glColor3iv
winspool.drv
SetPortW
AddPortExW
ScheduleJob
PrinterProperties
XcvDataW
FindNextPrinterChangeNotification
EnumPrintProcessorDatatypesW
SetPortA
ResetPrinterW
oledlg
OleUIInsertObjectA
wsock32
WSARecvEx
WSASetBlockingHook
shutdown
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oqngCF Size: 1KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LUV Size: 1024B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GOTYM Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AGbvFQ Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kkPQAu Size: 512B - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ