Static task
static1
Behavioral task
behavioral1
Sample
8f257c811d4a280496536ad5a8b9281c7e84c64877ff0a1171c67f6e779ed2ca.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8f257c811d4a280496536ad5a8b9281c7e84c64877ff0a1171c67f6e779ed2ca.exe
Resource
win10v2004-20230831-en
General
-
Target
8f257c811d4a280496536ad5a8b9281c7e84c64877ff0a1171c67f6e779ed2ca
-
Size
152KB
-
MD5
de0496121929830ff6b4215b8a450ae3
-
SHA1
27c575cf42aba72491c8f66898ab1c1e49e68e99
-
SHA256
8f257c811d4a280496536ad5a8b9281c7e84c64877ff0a1171c67f6e779ed2ca
-
SHA512
971859e025602fa67a35280e70769c48ddc07794797fb9075e0db47d1fc0023a6492715db4f63e856b3e2e286734864a64464c58d252b1732cc4737e592b4da3
-
SSDEEP
1536:hnRSIGhEQ8tid9E4h0ZM+PaBJGgnO3fSkYoIe:p0IsEFtidCIJGgnO3fSkPI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f257c811d4a280496536ad5a8b9281c7e84c64877ff0a1171c67f6e779ed2ca
Files
-
8f257c811d4a280496536ad5a8b9281c7e84c64877ff0a1171c67f6e779ed2ca.exe windows x86
557c4c0ce9a75167eb79a34e6c5d18c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
DbgPrint
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControlsEx
comdlg32
ChooseFontW
kernel32
CloseHandle
CreateMutexW
CreateThread
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_wcmdln
abort
calloc
exit
free
fwrite
malloc
memmove
signal
strncmp
vfprintf
wcsncmp
shell32
ShellAboutW
winmm
PlaySoundW
gdi32
CreateFontIndirectW
CreateSolidBrush
DeleteObject
GetStockObject
SelectObject
user32
ActivateKeyboardLayout
BeginPaint
CheckMenuItem
CopyImage
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextW
EndDialog
EndPaint
GetAsyncKeyState
GetDlgItem
GetForegroundWindow
GetKeyState
GetKeyboardLayout
GetKeyboardState
GetMenu
GetMessageExtraInfo
GetMessageW
GetMonitorInfoW
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowRect
GetWindowThreadProcessId
IntersectRect
InvalidateRect
IsDlgButtonChecked
KillTimer
LoadImageW
LoadStringW
MapVirtualKeyW
MonitorFromPoint
OffsetRect
PostMessageW
PostQuitMessage
RegisterClassExW
SendInput
SendMessageW
SetTimer
SetWindowPos
SetWindowTextW
ShowWindow
ToUnicode
TranslateMessage
UpdateWindow
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 33KB - Virtual size: 32KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ