Static task
static1
Behavioral task
behavioral1
Sample
8f28b22aeef625c6791286be1f2418dfd6c141387e3cc5bed7b08b4cde0787ba.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8f28b22aeef625c6791286be1f2418dfd6c141387e3cc5bed7b08b4cde0787ba.exe
Resource
win10v2004-20230703-en
General
-
Target
8f28b22aeef625c6791286be1f2418dfd6c141387e3cc5bed7b08b4cde0787ba
-
Size
857KB
-
MD5
d874251db621d90706d38d5a3f8659e5
-
SHA1
07f20f5519f379413a9a61de4d5712ce09ff506e
-
SHA256
8f28b22aeef625c6791286be1f2418dfd6c141387e3cc5bed7b08b4cde0787ba
-
SHA512
2a5d1e178468b40927bf749cb59af2d4250d492a8da790b182c09ab1ddb62216d3f4842aae4314af2bb81db80b05ce9a686ac95c84154be5d27cae03d65e44b4
-
SSDEEP
12288:XTJXOTzKNLXQ6IRu5Xz+w60ZNOriOzRotzg0s:DJXOTzKhIRu5Xz+w3aricR0k0s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f28b22aeef625c6791286be1f2418dfd6c141387e3cc5bed7b08b4cde0787ba
Files
-
8f28b22aeef625c6791286be1f2418dfd6c141387e3cc5bed7b08b4cde0787ba.exe windows x64
74652f44c80d7945ae320c0487ec0d74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
gdi32
SelectObject
SetBkColor
SetBkMode
SetTextColor
SetTextAlign
SelectClipRgn
CreateDIBSection
MoveToEx
TextOutW
ExtTextOutW
Polygon
Rectangle
LineTo
GetTextExtentPoint32W
GetDeviceCaps
Ellipse
DeleteObject
DeleteDC
CreateSolidBrush
CreateRectRgn
CreateFontW
CreatePen
CreateCompatibleDC
BitBlt
GetTextMetricsW
Arc
user32
LoadCursorW
LoadBitmapW
GetWindow
GetParent
SetWindowLongPtrW
GetWindowLongPtrW
SetWindowLongW
GetWindowLongW
FrameRect
FillRect
DrawFocusRect
GetSysColorBrush
GetSysColor
ChildWindowFromPoint
WindowFromPoint
AdjustWindowRectEx
AdjustWindowRect
GetWindowRect
GetClientRect
GetWindowTextW
SetWindowTextW
ShowScrollBar
RedrawWindow
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
UpdateWindow
SetMenuItemInfoW
GetMenuItemInfoW
AppendMenuW
EnableMenuItem
CheckMenuItem
DestroyMenu
CreateMenu
DrawMenuBar
SetMenu
LoadIconW
IsWindowEnabled
EnableWindow
KillTimer
SetTimer
ReleaseCapture
SetCapture
GetKeyboardState
GetFocus
SetFocus
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
GetDialogBaseUnits
IsDlgButtonChecked
BringWindowToTop
IsWindowVisible
SetWindowPos
MoveWindow
CloseWindow
ShowWindow
DestroyWindow
IsChild
CreateWindowExW
RegisterClassExW
UnregisterClassW
PostQuitMessage
DefWindowProcW
DestroyIcon
LoadImageW
IsDialogMessageW
TranslateMessage
SetScrollInfo
GetScrollInfo
MonitorFromWindow
GetMonitorInfoW
CharUpperW
CharUpperBuffW
PostMessageW
SendMessageW
PeekMessageW
DispatchMessageW
GetMessageW
DrawEdge
TrackMouseEvent
LoadStringA
LoadCursorA
CharLowerW
CharLowerBuffW
GetSystemMetrics
GetDesktopWindow
SetCursor
MessageBoxW
PeekMessageA
DispatchMessageA
kernel32
SetEnvironmentVariableA
HeapSize
OutputDebugStringW
WriteConsoleW
LoadLibraryExW
FreeLibrary
SetConsoleCtrlHandler
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
HeapReAlloc
FlushFileBuffers
FatalAppExitA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
GetModuleFileNameA
GetTimeZoneInformation
GetProcessHeap
HeapAlloc
SetEndOfFile
GetConsoleCP
FindFirstFileExW
SetStdHandle
DeleteFileW
AreFileApisANSI
GetModuleHandleExW
ExitProcess
ReadConsoleW
GetConsoleMode
DeleteCriticalSection
GetStdHandle
GetCurrentThreadId
GetCurrentThread
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
RaiseException
RtlUnwindEx
HeapFree
LeaveCriticalSection
EnterCriticalSection
DecodePointer
EncodePointer
CreateSemaphoreW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
Sleep
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCommandLineA
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
GetFileType
SystemTimeToTzSpecificLocalTime
GetLastError
SetEnvironmentVariableW
IsProcessorFeaturePresent
IsDebuggerPresent
GlobalAlloc
GlobalFree
WaitForSingleObject
WriteFile
ReadFile
GetFileTime
SetFileTime
CloseHandle
GetModuleFileNameW
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
VerSetConditionMask
GlobalLock
GlobalUnlock
MulDiv
LoadLibraryW
VerifyVersionInfoW
MultiByteToWideChar
WideCharToMultiByte
GlobalSize
GlobalMemoryStatus
SetFilePointer
SetFilePointerEx
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTempPathW
FindFirstFileW
FindNextFileW
CopyFileW
MoveFileExW
GetComputerNameA
GetSystemTime
GetLocalTime
QueryPerformanceCounter
QueryPerformanceFrequency
ole32
CoInitialize
CoTaskMemFree
CoUninitialize
shell32
SHGetKnownFolderPath
SHGetFolderPathW
ShellExecuteW
SHGetPathFromIDListW
SHBrowseForFolderW
advapi32
RegCloseKey
RegOpenKeyExA
RegEnumValueA
comdlg32
ChooseColorW
GetSaveFileNameW
GetOpenFileNameA
GetOpenFileNameW
netapi32
NetShareEnum
NetApiBufferFree
comctl32
ord8
ord413
ord412
ord410
InitCommonControlsEx
mpr
WNetGetUniversalNameW
shlwapi
PathCompactPathW
Sections
.text Size: 690KB - Virtual size: 690KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ