E:\SVN\rczip10452\bin\Win32\release\pdb\HaoZip7zSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
21f498a432938aae5341070c3856a200N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21f498a432938aae5341070c3856a200N.exe
Resource
win10v2004-20240802-en
General
-
Target
21f498a432938aae5341070c3856a200N
-
Size
2.3MB
-
MD5
21f498a432938aae5341070c3856a200
-
SHA1
40bc7f93f6bbf4cd74160236a48960b3193026ce
-
SHA256
ee63694aae3af1d358b384b95a6c451b618b9d36b55c342a138772f6d96a7808
-
SHA512
1be0b0897b5f533a957cc956755fbaffa56fbcf25488018c7ea679334950bd0ada10934fa768b6bcb508b82b2e92dd7138737869d36ce0c48baf818cb3dad924
-
SSDEEP
49152:mcttkQ7snDb3V3E5ipcsRUykopyp2BkWhydmvPED:mcty7V3lpJU9eypoNNPED
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 21f498a432938aae5341070c3856a200N
Files
-
21f498a432938aae5341070c3856a200N.exe windows:5 windows x86 arch:x86
4283ff39c97ae65ec48855e1ae1a9388
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
CommandLineToArgvW
kernel32
FlushFileBuffers
WriteConsoleW
SetStdHandle
FreeLibrary
HeapAlloc
HeapFree
GetProcessHeap
LoadLibraryW
GetLastError
GetProcAddress
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetVersionExW
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
CreateFileW
ExpandEnvironmentStringsW
WaitForSingleObject
GetModuleFileNameW
CreateProcessW
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
SetFileApisToOEM
GetEnvironmentVariableW
SetPriorityClass
GetCurrentThread
SetThreadPriority
GetCommandLineW
CreateDirectoryW
RemoveDirectoryW
FindFirstFileW
FindClose
FindNextFileW
LoadLibraryExW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEndOfFile
SetFileTime
WriteFile
FormatMessageW
InterlockedExchangeAdd
ResumeThread
MultiByteToWideChar
GetFileSize
SetFilePointer
ReadFile
GetFullPathNameW
GetTempFileNameW
MoveFileExW
lstrlenW
GetTempPathW
GetLongPathNameW
MoveFileW
GetWindowsDirectoryW
DeleteFileW
SetFileAttributesW
SetEvent
ResetEvent
CreateEventW
FindResourceW
FileTimeToSystemTime
SetFilePointerEx
GetConsoleMode
GetConsoleCP
OutputDebugStringW
LCMapStringW
HeapReAlloc
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetACP
VirtualFree
VirtualAlloc
WaitForMultipleObjects
WideCharToMultiByte
TerminateProcess
Sleep
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSize
GetModuleHandleExW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
CreateThread
GetCurrentThreadId
ExitThread
RaiseException
RtlUnwind
ExitProcess
user32
PostQuitMessage
KillTimer
TranslateMessage
IsDialogMessageW
LoadIconW
CreateDialogParamW
IsWindowVisible
EnableWindow
GetMessageW
DestroyIcon
IsWindow
ShowWindow
MessageBoxW
GetWindowRect
DialogBoxParamW
SetWindowPos
GetSystemMetrics
SetFocus
GetWindowTextW
GetDlgItem
EndDialog
SendMessageW
SetWindowTextW
ScreenToClient
SetTimer
GetDesktopWindow
LoadStringW
DispatchMessageW
PostMessageW
gdi32
CreateSolidBrush
DeleteObject
ole32
CoInitialize
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
Sections
.text Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ