Static task
static1
Behavioral task
behavioral1
Sample
b8d98cdc1a32bbad339b15233a61567bb0762cbb8454f110f0319474a3bf6660.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b8d98cdc1a32bbad339b15233a61567bb0762cbb8454f110f0319474a3bf6660.exe
Resource
win10v2004-20230831-en
General
-
Target
b8d98cdc1a32bbad339b15233a61567bb0762cbb8454f110f0319474a3bf6660
-
Size
511KB
-
MD5
7f715fa0c55fa63982cde820fe25fdb3
-
SHA1
649f09c38a2a59927b835354069e7d559019c5a6
-
SHA256
b8d98cdc1a32bbad339b15233a61567bb0762cbb8454f110f0319474a3bf6660
-
SHA512
9b7a692d022288e09b9d47741da9fb89874ff4b6958c0234a6fdd5f16ad5d16dc70f523d7854c7e97e06716f76eb9cd10d998c8a6dc269d517c0b2bc8e25f209
-
SSDEEP
6144:GwHrVyN8vhG6rIKRhCoX0Fr37hfQRkMj9FSu6qbvqk65pAOw1:xVyNhKRhCoX479QR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8d98cdc1a32bbad339b15233a61567bb0762cbb8454f110f0319474a3bf6660
Files
-
b8d98cdc1a32bbad339b15233a61567bb0762cbb8454f110f0319474a3bf6660.exe windows x86
4d26b70a0b4386a094ddc2885c2ad406
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControls
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetProfileIntW
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetVersionExW
GlobalAlloc
GlobalLock
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WriteProfileStringW
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_finite
_fpreset
_initterm
_iob
_isnan
_lock
_onexit
_strdup
_strupr
_unlock
_wcmdln
_wcsicmp
abort
acos
asin
atan
calloc
cos
cosh
exit
exp
fmod
free
fwrite
log
log10
malloc
memcpy
memmove
modf
pow
signal
sin
sinh
sqrt
strncmp
swprintf
swscanf
tan
tanh
vfprintf
wcscat
wcschr
wcscmp
wcscpy
wcslen
shell32
ShellAboutW
gdi32
GetStockObject
GetTextExtentPoint32W
SetBkMode
SetTextColor
user32
AppendMenuW
CallWindowProcW
CheckDlgButton
CheckMenuItem
CheckRadioButton
CloseClipboard
CreateDialogParamW
CreatePopupMenu
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawFrameControl
DrawStateW
EmptyClipboard
EnableMenuItem
EnableWindow
EnumChildWindows
GetAsyncKeyState
GetClassNameW
GetClipboardData
GetDlgItem
GetDlgItemTextW
GetFocus
GetKeyboardLayout
GetKeyboardState
GetMenu
GetMessageW
GetParent
GetSubMenu
GetSystemMetrics
GetWindowLongW
GetWindowRect
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDlgButtonChecked
IsWindow
IsWindowEnabled
LoadImageW
LoadMenuW
LoadStringW
MapVirtualKeyExW
MoveWindow
OpenClipboard
PostMessageW
PostQuitMessage
SendDlgItemMessageW
SendMessageW
SetClipboardData
SetDlgItemTextW
SetFocus
SetMenu
SetWindowLongW
ShowWindow
ToAsciiEx
TrackMouseEvent
TrackPopupMenu
TranslateMessage
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 406KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 58KB - Virtual size: 57KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ