e:\WORKSPACE\LZPV3\temp\testLZPV\testLZPV.pdb
Static task
static1
Behavioral task
behavioral1
Sample
53bb40394a0610ced8ed07d9af4b321b026eed87fee208198f0c45f5b56b5600.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
53bb40394a0610ced8ed07d9af4b321b026eed87fee208198f0c45f5b56b5600.exe
Resource
win10v2004-20241007-en
General
-
Target
53bb40394a0610ced8ed07d9af4b321b026eed87fee208198f0c45f5b56b5600
-
Size
1.8MB
-
MD5
c744e9eecc88ddd5804768e8a2e93b8d
-
SHA1
4ac99acf7a011331b7b095f88fe4b59c09d4674b
-
SHA256
53bb40394a0610ced8ed07d9af4b321b026eed87fee208198f0c45f5b56b5600
-
SHA512
2f200e75370a0d2417bd021c8a9537eda20a5cf5fd47e5e53fc1c496af869c238f2a72b034fa97ee57981e33dc93332c034d2585491624a403995d994536fc34
-
SSDEEP
49152:ggyFQ0uZtt/RNqxjueMBFdgXBqw8QVyeoGGd:ggaQ0xxymC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53bb40394a0610ced8ed07d9af4b321b026eed87fee208198f0c45f5b56b5600
Files
-
53bb40394a0610ced8ed07d9af4b321b026eed87fee208198f0c45f5b56b5600.exe windows:4 windows x86 arch:x86
b516107d51f4b4f4aef1327bb6f62325
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GlobalFlags
SetErrorMode
GetTickCount
GetStartupInfoW
GetSystemTimeAsFileTime
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
SetStdHandle
GetFileType
HeapSize
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
SetEndOfFile
HeapCreate
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
GetTimeZoneInformation
GetLocaleInfoA
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEnvironmentVariableA
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
CreateFileW
GetFileTime
GetFileSize
GetFileAttributesW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GlobalFindAtomW
CompareStringW
GetVersionExA
GetModuleHandleA
GetCurrentProcessId
GlobalAddAtomW
WaitForSingleObject
WritePrivateProfileStringW
FreeResource
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
GlobalDeleteAtom
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryW
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
MulDiv
CreateThread
GetEnvironmentVariableW
LocalAlloc
MultiByteToWideChar
lstrlenA
GetThreadLocale
HeapFree
GetNativeSystemInfo
GetProcessHeap
HeapAlloc
FreeLibrary
LoadLibraryA
SetLastError
IsBadReadPtr
VirtualProtect
VirtualFree
VirtualAlloc
ExitProcess
GetCurrentThread
WriteFile
Sleep
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
lstrlenW
GetLastError
GetModuleFileNameW
GlobalFree
GlobalAlloc
GetCurrentProcess
GetModuleHandleW
GetProcAddress
CloseHandle
HeapDestroy
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
UnregisterClassW
CharUpperW
LoadCursorW
GetSysColorBrush
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
PtInRect
DefWindowProcW
CallWindowProcW
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
GetWindowTextW
SetFocus
ShowWindow
MoveWindow
SetWindowLongW
GetDlgCtrlID
SetWindowTextW
RegisterClipboardFormatW
IsDialogMessageW
PostThreadMessageW
SendDlgItemMessageW
GetSysColor
DestroyMenu
CopyRect
GetWindowThreadProcessId
GetLastActivePopup
MessageBoxW
SetCursor
SetWindowsHookExW
CallNextHookEx
GetMessageW
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
PostMessageW
UnhookWindowsHookEx
GetDesktopWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
KillTimer
DispatchMessageW
TranslateMessage
PeekMessageW
SetTimer
DrawIcon
GetClientRect
GetSystemMetrics
SendMessageW
IsIconic
SystemParametersInfoW
AppendMenuW
GetSystemMenu
LoadIconW
UnregisterClassA
gdi32
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetMapMode
GetStockObject
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetClipBox
SetMapMode
SetTextColor
GetDeviceCaps
CreateBitmap
GetObjectW
ExtTextOutW
SaveDC
RestoreDC
SetBkColor
GetRgnBox
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegCloseKey
RegQueryValueW
RegEnumKeyW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
UrlUnescapeW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
CoCreateGuid
CoInitialize
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
SysAllocString
OleCreateFontIndirect
SysStringLen
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
myie
LZExplorer_ClickRandHyperlink2
LZExplorer_GetCurrentURL2
LZExplorer_GetCurrentURL
LZExplorer_SetElementValueByClass
LZExplorer_ClickRandElementByParentDivClassName
LZExplorer_GetElementValueByID
LZExplorer_GetScrollTop
LZExplorer_ClickIFrameByHyperLinkSubText
LZExplorer_ClickElementByPos
LZExplorer_GetClientPos
LZExplorer_ClickPageHyperLink
LZExplorer_IsPageCompleteLoad
LZExplorer_ClickPageHyperLinkByStatistics
LZExplorer_ClickElementByClassName
LZExplorer_ScrollElementToViewByID
LZExplorer_ReleaseHandle
LZExplorer_ClickRandElement2
LZExplorer_SetPosition
LZExplorer_GetElementRect
LZExplorer_IsHasElementByID
LZExplorer_PageScrollByMouseWheel
LZExplorer_GetScrollHeight
LZExplorer_ClickRandElement
LZExplorer_OpenURL
LZExplorer_GoBack
LZExplorer_ReviseElementPos
LZExplorer_SetElementFixClickXPos
LZExplorer_ClickElementByID
LZExplorer_ClickRandHyperlink
LZExplorer_SetInputValueByID
LZExplorer_CleanCookies
LZExplorer_SetVolumn
LZExplorer_CreateHandle
libxl
xlCreateBookW
myhooklib
MyHook_Install
iphlpapi
GetAdaptersInfo
ws2_32
closesocket
recv
gethostbyname
WSAStartup
socket
htons
connect
send
wininet
InternetOpenUrlW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
InternetQueryDataAvailable
InternetQueryOptionW
InternetCrackUrlW
InternetCanonicalizeUrlW
Sections
.text Size: 332KB - Virtual size: 331KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ