Static task
static1
Behavioral task
behavioral1
Sample
7BCD80F4BA829652FCD4514585D00052CE8C8BDB48B3F7B651846DE264BCBA32.exe
Resource
win7-20240903-en
General
-
Target
7BCD80F4BA829652FCD4514585D00052CE8C8BDB48B3F7B651846DE264BCBA32.7z
-
Size
105KB
-
MD5
86050cc8a5457760d4fa8c14509ad92f
-
SHA1
1ae2772df112be7ce33c4ddc7d656c4ae0629536
-
SHA256
9b16570f013d5e5d3b0a16638b277f1be1c2f8f6f6bb05ea2181c1d9f3da8ead
-
SHA512
debdffd29d4073b9ceec99407ca27bb3ab7be867233b632195b29a7af82db55890dc3835e9f530fbc416531a99cb37d4fdd504af98c828ed2ef623b55a132592
-
SSDEEP
3072:sTCq2q9/GrJVMlH4Y2OqD+VfjqSVaib/Ehjmz:sR2qgMlYhD+4zh4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7BCD80F4BA829652FCD4514585D00052CE8C8BDB48B3F7B651846DE264BCBA32.exe
Files
-
7BCD80F4BA829652FCD4514585D00052CE8C8BDB48B3F7B651846DE264BCBA32.7z.7z
Password: infected
-
7BCD80F4BA829652FCD4514585D00052CE8C8BDB48B3F7B651846DE264BCBA32.exe.exe windows:5 windows x86 arch:x86
Password: infected
552be4a6aa12faa2989c75d1b3a14218
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
VirtualAllocEx
user32
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetDesktopWindow
GetDoubleClickTime
GetFocus
GetKeyState
GetMessageA
GetMessageW
GetParent
GetSysColor
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetUpdateRgn
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowRgn
HideCaret
InvalidateRect
IsChild
IsIconic
IsRectEmpty
IsWindowVisible
IsZoomed
KillTimer
LoadCursorA
LoadCursorW
LoadIconA
LoadIconW
MapVirtualKeyA
MapVirtualKeyW
MessageBeep
MessageBoxA
MoveWindow
MsgWaitForMultipleObjects
OpenClipboard
PeekMessageA
PeekMessageW
PostMessageA
GetCaretBlinkTime
PostThreadMessageA
PostThreadMessageW
RegisterClassA
RegisterClassW
RegisterClipboardFormatA
RegisterWindowMessageA
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
ScreenToClient
ScrollWindowEx
SendMessageA
SendMessageW
SetCapture
SetCaretPos
SetClipboardData
SetClipboardViewer
SetCursor
SetFocus
SetForegroundWindow
SetParent
SetRect
SetTimer
SetWindowLongA
SetWindowPos
SetWindowRgn
SetWindowTextA
SetWindowTextW
SetWindowsHookExA
ShowWindow
SystemParametersInfoA
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UnregisterClassW
UpdateWindow
ValidateRect
ValidateRgn
WindowFromPoint
wsprintfA
CharLowerW
GetActiveWindow
ExitWindowsEx
EnumClipboardFormats
EndPaint
EnableMenuItem
EmptyClipboard
DrawIconEx
DrawFocusRect
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyIcon
DestroyCursor
DefWindowProcW
DefWindowProcA
CreateWindowExW
CreateWindowExA
CreateIconIndirect
CreateCursor
CreateCaret
CloseClipboard
ClientToScreen
ChangeClipboardChain
CallNextHookEx
BeginPaint
PostMessageW
advapi32
RegOpenKeyA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegCreateKeyExW
RegFlushKey
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
AdjustTokenPrivileges
imm32
ImmAssociateContext
ImmGetCompositionStringA
ImmGetCompositionStringW
ImmGetContext
ImmNotifyIME
ImmReleaseContext
ImmSetCandidateWindow
ImmSetCompositionFontA
ImmSetCompositionFontW
ImmSetCompositionWindow
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ