Static task
static1
Behavioral task
behavioral1
Sample
7666b34895ba022e7cdcb9fe2b87f3c6d188679b65ecdbf41b9e266a5172ca89.exe
Resource
win7-20241010-en
General
-
Target
7666b34895ba022e7cdcb9fe2b87f3c6d188679b65ecdbf41b9e266a5172ca89
-
Size
604KB
-
MD5
bf140ac34ef140265a23a0a4425ecf87
-
SHA1
5d9b27317904286f6b6cfe2673cf61b4aaf76758
-
SHA256
7666b34895ba022e7cdcb9fe2b87f3c6d188679b65ecdbf41b9e266a5172ca89
-
SHA512
38ecd2a78427fbcf9f80b9a0c762f52a7d7858d7c9e7421ed3c70df7e1d69df5e6234b029105f2172a1f04538e98a1978b2409b28b023e1c89cfae8a4e074d57
-
SSDEEP
12288:wi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8yZng87nI:wi2Tro2H2HESq2eWJ6MQjySjyN17I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7666b34895ba022e7cdcb9fe2b87f3c6d188679b65ecdbf41b9e266a5172ca89
Files
-
7666b34895ba022e7cdcb9fe2b87f3c6d188679b65ecdbf41b9e266a5172ca89.exe windows:4 windows x86 arch:x86
d32357501b59d8d40cb2a554799505fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
LocalFree
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcatA
SetLastError
GlobalAlloc
lstrcpyA
LoadLibraryExA
EnumResourceNamesA
Sleep
OpenProcess
TerminateProcess
SetFileAttributesA
SetFilePointer
GlobalLock
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
Process32Next
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LCMapStringA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CopyFileA
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
GetFileSize
ReadFile
GetModuleFileNameA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CreateFileA
WriteFile
CloseHandle
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
EndUpdateResourceA
UpdateResourceA
RtlMoveMemory
lstrcpynW
BeginUpdateResourceA
GlobalGetAtomNameA
user32
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetFocus
SetWindowPos
GetCapture
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
ClientToScreen
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessagePos
GetMessageTime
RegisterWindowMessageA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
IsWindowVisible
GetWindowLongA
GetWindowTextA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
GetWindowThreadProcessId
GetClassNameA
SendMessageA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
PtInRect
UnregisterClassA
ole32
CoCreateInstance
CoUninitialize
gdi32
ExtTextOutA
TextOutA
RectVisible
PtVisible
Escape
GetObjectA
GetStockObject
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 396KB - Virtual size: 530KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE