Static task
static1
Behavioral task
behavioral1
Sample
7d4176ae128dc57b7b50d061929bbb609689f32e3c4c2360138ba85b4e01b083.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7d4176ae128dc57b7b50d061929bbb609689f32e3c4c2360138ba85b4e01b083.exe
Resource
win10v2004-20241007-en
General
-
Target
7d4176ae128dc57b7b50d061929bbb609689f32e3c4c2360138ba85b4e01b083.exe
-
Size
101KB
-
MD5
b79636b929a2df0343d4c4ef61e19e8c
-
SHA1
987aea51bf3a6e974dc841b910fa66bbd12574de
-
SHA256
7d4176ae128dc57b7b50d061929bbb609689f32e3c4c2360138ba85b4e01b083
-
SHA512
273c58cf3d7e08c7fd406ab477ef024e8d1fb55e91b4fed159325f01ca9bd8d8f57136739d29d4db6de36280f1cae251cf9fd3d2d7dd32511421ebdf6d409d09
-
SSDEEP
1536:6GhYTUW9pudFyD57ByH87QsvoQkOz600TwbRAy+j3k7:6j4ldU/A81veyAyo3k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7d4176ae128dc57b7b50d061929bbb609689f32e3c4c2360138ba85b4e01b083.exe
Files
-
7d4176ae128dc57b7b50d061929bbb609689f32e3c4c2360138ba85b4e01b083.exe.exe windows:4 windows x86 arch:x86
ce501e09ace56d68044a5bc74f6485f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundW
shlwapi
PathCombineW
PathFileExistsW
PathAppendW
gdiplus
GdipCreateHBITMAPFromBitmap
GdiplusShutdown
GdipDisposeImage
GdipFree
GdipCloneImage
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdiplusStartup
GdipAlloc
kernel32
EnterCriticalSection
FlushInstructionCache
GetCurrentProcess
lstrlenW
InterlockedIncrement
lstrlenA
DebugBreak
OutputDebugStringW
LeaveCriticalSection
GetPrivateProfileIntW
WritePrivateProfileStringW
GetPrivateProfileStringW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetModuleFileNameW
lstrcmpiW
lstrcpyW
CompareStringW
WriteFile
SizeofResource
LoadResource
FindResourceW
CreateFileW
GetVersionExW
lstrcpynW
GlobalFree
GlobalAlloc
LockResource
ExpandEnvironmentStringsW
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
GetCurrentThreadId
CreateMutexW
GetLastError
CloseHandle
InterlockedDecrement
GetModuleHandleW
CreateDirectoryW
GetStartupInfoW
user32
GetDlgCtrlID
PtInRect
ClientToScreen
DrawFocusRect
InflateRect
DrawEdge
IsWindowEnabled
SetFocus
FillRect
IsWindowVisible
SetRectEmpty
SetCursor
ScreenToClient
GetWindowTextLengthW
GetClassNameW
OffsetRect
GetDC
ReleaseDC
GetFocus
GetSysColor
GetActiveWindow
GetDlgItemTextW
MoveWindow
SetWindowRgn
SetDlgItemTextW
SetWindowTextW
GetDlgItem
EnableWindow
GetWindowTextW
GetClientRect
DrawTextW
CallWindowProcW
IsMenu
DestroyMenu
CreatePopupMenu
GetParent
GetCursorPos
SetForegroundWindow
TrackPopupMenu
LoadImageW
PostQuitMessage
IsDialogMessageW
SetCapture
GetCapture
GetMenu
AdjustWindowRectEx
CreateDialogParamW
SystemParametersInfoW
FindWindowExW
GetSystemMetrics
EndPaint
InvalidateRect
GetWindowLongW
GetWindowRect
KillTimer
PostMessageW
IsWindow
IsIconic
ShowWindow
SetWindowPos
LoadStringW
CharNextW
wvsprintfW
SendMessageW
MessageBoxW
CreateWindowExW
SetWindowLongW
GetClassInfoExW
LoadCursorW
wsprintfW
RegisterClassExW
DestroyWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
DefWindowProcW
SetTimer
UpdateWindow
ReleaseCapture
InsertMenuItemW
MapWindowPoints
BeginPaint
gdi32
CreateFontW
SetTextColor
GetObjectW
CreateFontIndirectW
GetStockObject
CreateCompatibleDC
DeleteDC
CreatePolygonRgn
SetBkMode
SelectObject
CreateSolidBrush
DeleteObject
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
Shell_NotifyIconW
SHGetSpecialFolderPathW
ole32
CoInitialize
CreateStreamOnHGlobal
CoUninitialize
comctl32
InitCommonControlsEx
ImageList_Destroy
ImageList_GetIconSize
ImageList_Draw
_TrackMouseEvent
ImageList_Create
ImageList_Add
msimg32
AlphaBlend
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
msvcrt
time
_snwprintf
_wtoi
__CxxFrameHandler
memcpy
free
realloc
memmove
wcscmp
wcstok
memcmp
__dllonexit
_onexit
_exit
wcslen
iswdigit
__wgetmainargs
_initterm
_XcptFilter
exit
_wcmdln
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_purecall
_controlfp
localtime
memset
wcscpy
malloc
??2@YAPAXI@Z
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ