Static task
static1
Behavioral task
behavioral1
Sample
08c4d27739aaf3b54573b16b2d87a3ad9825d2ac8d6d1e5492fdc8a541d813f5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08c4d27739aaf3b54573b16b2d87a3ad9825d2ac8d6d1e5492fdc8a541d813f5.exe
Resource
win10v2004-20230220-en
General
-
Target
08c4d27739aaf3b54573b16b2d87a3ad9825d2ac8d6d1e5492fdc8a541d813f5
-
Size
3.1MB
-
MD5
598260eed908f2b53d778e9c41efbeb4
-
SHA1
0af2acf366c223312362fdf4d22c1e6aa529a9f4
-
SHA256
08c4d27739aaf3b54573b16b2d87a3ad9825d2ac8d6d1e5492fdc8a541d813f5
-
SHA512
2d9189b0ea8b52ebb01ebcb9a06e96ca984a984d15460d4d81831256513145a0907311141edecaae638009833a978e598ab3677af9f90c5a6396073d5e35b8bc
-
SSDEEP
98304:XgU06B+SjKA5WkhjtpH5g4ydghM6lvG3y7:wU0Gx58gh1lvG3y7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08c4d27739aaf3b54573b16b2d87a3ad9825d2ac8d6d1e5492fdc8a541d813f5
Files
-
08c4d27739aaf3b54573b16b2d87a3ad9825d2ac8d6d1e5492fdc8a541d813f5.exe windows x86
41c333615468654587f6f270a91e09be
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsSetValue
GetCurrentDirectoryA
DeleteFileA
lstrcpyA
lstrcmpiA
ReadFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetACP
SetErrorMode
GetFileAttributesExA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetTempFileNameA
GetTempPathA
GetWindowsDirectoryA
GetNumberFormatA
InitializeCriticalSectionAndSpinCount
GetProfileIntA
SearchPathA
VirtualProtect
GetUserDefaultLCID
FindResourceExW
HeapFree
RaiseException
RtlUnwind
ExitProcess
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitThread
CreateThread
HeapReAlloc
HeapSize
HeapQueryInformation
GetSystemTimeAsFileTime
SetStdHandle
GetFileType
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
SetHandleCount
GetStdHandle
GlobalFlags
GetConsoleMode
GetLocaleInfoW
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeW
LCMapStringW
CompareStringW
GetTimeZoneInformation
WriteConsoleW
EnumSystemLocalesA
IsValidLocale
CreateFileW
SetEnvironmentVariableA
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
FindResourceA
FreeResource
GlobalFindAtomA
GetVersionExA
LoadLibraryW
lstrcmpW
GlobalGetAtomNameA
GlobalAddAtomA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GlobalDeleteAtom
GetCurrentThread
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
GetModuleHandleW
GetCurrentProcessId
GetModuleFileNameA
WaitForSingleObject
GetCurrentThreadId
ResumeThread
SetThreadPriority
FreeLibrary
GetModuleFileNameW
ActivateActCtx
ReleaseActCtx
CreateActCtxW
DeactivateActCtx
SetLastError
GlobalFree
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceW
LoadResource
LockResource
SizeofResource
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
MulDiv
lstrlenA
TlsFree
DeleteCriticalSection
GetConsoleCP
LocalReAlloc
WinExec
LoadLibraryA
GetProcAddress
OpenProcess
CreateFileA
WriteFile
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateDirectoryA
GetTickCount
Sleep
CreateMutexA
GetLastError
InterlockedDecrement
FileTimeToSystemTime
CloseHandle
GetProcessHeap
user32
IsZoomed
SetWindowRgn
RedrawWindow
DestroyAcceleratorTable
WindowFromPoint
NotifyWinEvent
SetClassLongA
LoadMenuW
SetCapture
MessageBeep
DrawStateA
DrawIconEx
DrawEdge
DrawFrameControl
DrawFocusRect
CopyAcceleratorTableA
ToAsciiEx
GetKeyboardLayout
GetKeyboardState
LoadAcceleratorsW
CreateAcceleratorTableA
SetCursorPos
LockWindowUpdate
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
GetMenuDefaultItem
InvertRect
HideCaret
EnableScrollBar
GetIconInfo
CopyImage
GetNextDlgGroupItem
DefFrameProcA
DefMDIChildProcA
DrawMenuBar
TranslateMDISysAccel
MonitorFromPoint
UpdateLayeredWindow
IsMenu
CreateMenu
PostThreadMessageA
WaitMessage
SetMenuDefaultItem
IsClipboardFormatAvailable
FrameRect
GetUpdateRect
OpenClipboard
SetClipboardData
CloseClipboard
EmptyClipboard
LoadImageW
RegisterClipboardFormatA
CopyIcon
CharUpperBuffA
GetDoubleClickTime
IsCharLowerA
MapVirtualKeyExA
SubtractRect
MapDialogRect
DrawIcon
DestroyCursor
GetWindowRgn
InvalidateRect
IsIconic
InsertMenuItemA
CreatePopupMenu
GetClassInfoA
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetMenu
BringWindowToTop
CharUpperA
GetDesktopWindow
TranslateAcceleratorA
GetWindowTextLengthA
GetWindowTextA
SetFocus
SetWindowPos
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
IsWindow
SetWindowTextA
IsDialogMessageA
UnionRect
SendDlgItemMessageA
GetDlgItem
CheckDlgButton
GetWindow
ShowOwnedPopups
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostQuitMessage
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
SendMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
GetMenuState
GetMenuStringA
AppendMenuA
GetMenuItemID
InsertMenuA
GetMenuItemCount
GetSubMenu
RemoveMenu
LoadCursorW
SetLayeredWindowAttributes
EnumDisplayMonitors
SystemParametersInfoA
KillTimer
SetTimer
DeleteMenu
InflateRect
RealChildWindowFromPoint
UnregisterClassA
LoadCursorA
GetSystemMetrics
GetSysColorBrush
RegisterWindowMessageA
LoadIconA
IsChild
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MonitorFromWindow
GetMonitorInfoA
MapWindowPoints
ScrollWindow
SetActiveWindow
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetClientRect
SetParent
GetSystemMenu
IsRectEmpty
MapVirtualKeyA
GetKeyNameTextA
GetMenuItemInfoA
CreateWindowExA
GetClassInfoExA
RegisterClassA
AdjustWindowRectEx
GetWindowRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
DefWindowProcA
CallWindowProcA
GetClassNameA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
UpdateWindow
LoadImageA
PostMessageA
wsprintfA
PtInRect
GetAsyncKeyState
LoadBitmapW
SetRect
WinHelpA
DestroyIcon
EqualRect
LoadIconW
GetCapture
ReleaseCapture
SetMenu
LoadAcceleratorsA
gdi32
OffsetRgn
CreatePolygonRgn
CreateCompatibleBitmap
IntersectClipRect
ExcludeClipRect
BitBlt
SetMapMode
SetTextColor
CreateCompatibleDC
GetClipBox
SetPixelV
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateDCA
RectInRegion
GetDeviceCaps
GetTextFaceA
SetPaletteEntries
ExtFloodFill
GetBoundsRect
FrameRgn
FillRgn
PtInRegion
GetViewportOrgEx
GetWindowOrgEx
LPtoDP
EnumFontFamiliesExA
Rectangle
SetPixel
StretchBlt
SetDIBColorTable
GetRgnBox
GetSystemPaletteEntries
RealizePalette
GetNearestPaletteIndex
GetPaletteEntries
CreatePalette
Polygon
Ellipse
Polyline
CreateEllipticRgn
GetTextColor
GetBkColor
LineTo
MoveToEx
SetTextAlign
CreateRoundRectRgn
CreateDIBSection
GetLayout
SetLayout
DeleteObject
SelectClipRgn
CreateRectRgn
GetObjectA
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
CreateBitmap
GetStockObject
SelectPalette
GetObjectType
CreatePen
CreateSolidBrush
CreateHatchBrush
CreateFontIndirectA
CreateRectRgnIndirect
SetRectRgn
CombineRgn
PatBlt
DPtoLP
CreateDIBitmap
GetTextMetricsA
EnumFontFamiliesA
GetTextCharsetInfo
GetTextExtentPoint32A
CopyMetaFileA
advapi32
RegSetValueExA
LookupPrivilegeValueA
GetLengthSid
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegEnumValueA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
RegEnumKeyExA
ole32
DoDragDrop
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
CreateStreamOnHGlobal
CoTaskMemFree
OleLockRunning
IsAccelerator
OleTranslateAccelerator
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
CoInitialize
CoUninitialize
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
OleGetClipboard
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocString
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
VariantChangeType
VarBstrFromDate
SysStringLen
msimg32
TransparentBlt
AlphaBlend
comctl32
ImageList_GetIconSize
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathRemoveFileSpecW
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
oleacc
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
gdiplus
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipCreateBitmapFromScan0
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdiplusShutdown
GdiplusStartup
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipDeleteGraphics
GdipAlloc
GdipFree
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipGetImageGraphicsContext
GdipCloneImage
GdipDrawImageI
imm32
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
winmm
mciSendCommandA
PlaySoundA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
comdlg32
GetFileTitleA
shell32
SHBrowseForFolderA
SHAppBarMessage
DragFinish
DragQueryFileA
SHGetFileInfoA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
SHGetSpecialFolderLocation
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 266KB - Virtual size: 266KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ