C:\Users\admin\Desktop\new version with NO UAC\Release\Win32Project9.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_3d02255fdc3a6a05f5053d48451eb544_7ev3n.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_3d02255fdc3a6a05f5053d48451eb544_7ev3n.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_3d02255fdc3a6a05f5053d48451eb544_7ev3n
-
Size
388KB
-
MD5
3d02255fdc3a6a05f5053d48451eb544
-
SHA1
77959f493b1485c1e1fa20c27a3bdd01d9de799f
-
SHA256
9b7dad1349f0474323ee2332079936dd16ebd51da21dcfb0127147b826f5b3e7
-
SHA512
7e27dc5b210c5083902f32645857a17e02d633997ef0f4ef295557531ad7b13597d7fa4cf631e48aad847e2442b74b915046366d41b70220fe669d9af29b4e4c
-
SSDEEP
6144:/aPIWVeTdJKsLxgcSNDQL5Q9VuwLmh0kdH371oHVCvvC:/uTs1gBpQL5kmh0671o1Ci
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-18_3d02255fdc3a6a05f5053d48451eb544_7ev3n
Files
-
2024-10-18_3d02255fdc3a6a05f5053d48451eb544_7ev3n.exe windows:5 windows x86 arch:x86
266bed6766ee2a20cf7c2dd0d6245d96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
CreateProcessW
ExitThread
WaitForSingleObject
GetLastError
ExitProcess
IsDebuggerPresent
GetVersionExW
GetVolumeInformationW
SetEndOfFile
HeapSize
WriteConsoleW
ReadConsoleW
GetProcAddress
FindFirstFileExW
FindClose
GetCommandLineW
GetCommandLineA
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetModuleHandleW
CreateProcessA
GetStartupInfoA
GetModuleFileNameW
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetModuleFileNameA
CloseHandle
ReadFile
GetFileSize
CreateFileW
GetFileAttributesW
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetLocalTime
CreateThread
WinExec
GetLogicalDrives
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
Sleep
GetFileAttributesExW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
FreeLibrary
LoadLibraryExW
RaiseException
RtlUnwind
QueryPerformanceFrequency
MoveFileExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetACP
HeapAlloc
HeapReAlloc
HeapFree
GetFileType
GetExitCodeProcess
user32
GetSystemMetrics
LoadCursorW
RegisterClassExW
CreateWindowExW
ShowWindow
ScreenToClient
GetCursorPos
DrawTextA
MessageBoxW
DefWindowProcW
PostQuitMessage
DestroyWindow
SetTimer
KillTimer
InvalidateRect
EndPaint
DrawTextW
FillRect
BeginPaint
DispatchMessageW
TranslateMessage
GetMessageW
GetWindowLongW
SetWindowLongW
gdi32
LineTo
MoveToEx
CreatePen
SetBkMode
DeleteObject
TextOutA
TextOutW
SetTextColor
SetBkColor
SelectObject
CreateFontW
CreateSolidBrush
advapi32
SystemFunction036
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetUserNameW
wininet
InternetOpenUrlW
InternetReadFile
InternetOpenW
netapi32
NetUserGetInfo
Sections
.text Size: 269KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ