Static task
static1
Behavioral task
behavioral1
Sample
7e317779749f7a0e5ff2717a0e38f1456f38e354248fb524c72eff15199ea5af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7e317779749f7a0e5ff2717a0e38f1456f38e354248fb524c72eff15199ea5af.exe
Resource
win10v2004-20240802-en
General
-
Target
7e317779749f7a0e5ff2717a0e38f1456f38e354248fb524c72eff15199ea5af
-
Size
90KB
-
MD5
2952cacfe9d09878241cab30182029fd
-
SHA1
bbe55c1f39c37aa7bbbb65bb8f65d04d7429952a
-
SHA256
7e317779749f7a0e5ff2717a0e38f1456f38e354248fb524c72eff15199ea5af
-
SHA512
75307a31b22769dd1b2f4f99f9dad243b31a1d373a030282329bff37a087409320182bd724df44c927cc100da7e765211fb59ba9d785a158eff07d171ae1e604
-
SSDEEP
1536:jlBlL/M3aTMYm7ohrWPe7lTHFvyyI9dHSi+Oc7MjREq5RPIrOJ/OVKdOyJ+eiN3Q:jdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e317779749f7a0e5ff2717a0e38f1456f38e354248fb524c72eff15199ea5af
Files
-
7e317779749f7a0e5ff2717a0e38f1456f38e354248fb524c72eff15199ea5af.exe windows:4 windows x86 arch:x86
e12f72e7fe59535708698b4de0340a02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetWindowsDirectoryW
SetErrorMode
CreateFileMappingA
GetComputerNameA
QueryPerformanceCounter
GetModuleFileNameA
SetPriorityClass
lstrcpyn
GetFileType
InitializeCriticalSection
GetLogicalDrives
GetProcessHeap
GetNumberFormatA
LocalAlloc
CreateEventW
GetTimeFormatA
GetVersionExW
GetProcessHeaps
CopyFileExW
GetHandleInformation
GlobalGetAtomNameA
FlushFileBuffers
CreateNamedPipeW
CopyFileA
GetCurrentDirectoryA
OpenWaitableTimerW
GetCommandLineW
lstrlen
CopyFileExA
FreeLibrary
SetComputerNameW
GetProcAddress
EnumCalendarInfoA
FindAtomA
GetModuleHandleW
CreatePipe
OpenProcess
CreateMailslotW
BeginUpdateResourceW
IsDebuggerPresent
GetVersionExA
GetEnvironmentStringsW
GetModuleHandleA
user32
GetSysColorBrush
RegisterClassExW
GetWindowLongA
SetMenu
ArrangeIconicWindows
DialogBoxParamW
LoadIconW
CreateIcon
CharNextA
GetMessageW
LoadImageA
TrackPopupMenuEx
mouse_event
GetParent
OpenClipboard
LoadIconW
GetIconInfo
CheckRadioButton
GetIconInfo
GetWindowTextW
OffsetRect
SetWindowPos
GetMenuStringW
CopyRect
EnumWindows
SetFocus
SetDlgItemInt
GetSystemMetrics
GetWindowTextLengthA
GetCapture
GetMenuItemCount
EnumDesktopsA
DestroyCursor
GetClassInfoExA
UpdateLayeredWindow
MonitorFromWindow
FrameRect
EnumChildWindows
FindWindowA
LoadBitmapW
RegisterClassExA
CloseWindow
IsMenu
MessageBeep
AdjustWindowRect
EnumDesktopWindows
DeleteMenu
MonitorFromRect
IsWindow
gdi32
ExtFloodFill
ExtEscape
EqualRgn
CopyEnhMetaFileW
SetPixelFormat
ResetDCW
CreatePolygonRgn
CreateDCA
SetTextJustification
GetKerningPairsA
GetDCPenColor
SetPaletteEntries
AbortPath
CreatePolyPolygonRgn
GetBkMode
advapi32
RegOpenKeyA
RegQueryValueW
RegReplaceKeyW
RegCreateKeyExW
RegRestoreKeyA
oleaut32
CreateDispTypeInfo
opengl32
glColor3iv
winspool.drv
SetPortW
AddPortExW
ScheduleJob
PrinterProperties
XcvDataW
FindNextPrinterChangeNotification
EnumPrintProcessorDatatypesW
SetPortA
ResetPrinterW
oledlg
OleUIInsertObjectA
wsock32
WSARecvEx
WSASetBlockingHook
shutdown
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oqngCF Size: 1KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LUV Size: 1024B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GOTYM Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AGbvFQ Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kkPQAu Size: 512B - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ