Static task
static1
Behavioral task
behavioral1
Sample
209e8512273709b75c1056c35051799c5bb95bebfcb5f2397972c3db490ceec2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
209e8512273709b75c1056c35051799c5bb95bebfcb5f2397972c3db490ceec2.exe
Resource
win10v2004-20230915-en
General
-
Target
209e8512273709b75c1056c35051799c5bb95bebfcb5f2397972c3db490ceec2
-
Size
212KB
-
MD5
76c2cf2edf3e2fa423d3380ab1ffb930
-
SHA1
86accc7be0f4a4eca05190f867f14802cdfa8829
-
SHA256
209e8512273709b75c1056c35051799c5bb95bebfcb5f2397972c3db490ceec2
-
SHA512
ab57bbe5b4eecda656a95933f76b6ab28fad0189fa6db5cf2b5285a774822d1df0d435e3f36185dc5ae071c4e339d82c6ba64555ff2a810a0cae3cbe72c03834
-
SSDEEP
3072:m2gF82LBIVL+aSP8DfEkljxqhSGRSDajT6vVteKm5:m2oTLOV/DfEqxqhSAca0Tg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 209e8512273709b75c1056c35051799c5bb95bebfcb5f2397972c3db490ceec2
Files
-
209e8512273709b75c1056c35051799c5bb95bebfcb5f2397972c3db490ceec2.exe windows:4 windows x86
cf3a420974ae7e52df219517e6153811
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetEnvironmentVariableA
GetCurrentDirectoryA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetModuleFileNameA
LoadLibraryA
CreateMutexA
CompareStringW
CompareStringA
SetEndOfFile
CreateFileW
CreateFileA
GetLocaleInfoW
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
WaitForSingleObject
ReleaseMutex
SetThreadPriority
GetThreadPriority
ResumeThread
SuspendThread
TerminateThread
GetExitCodeThread
Sleep
TerminateProcess
GetPriorityClass
SetPriorityClass
GetExitCodeProcess
CreateProcessA
DuplicateHandle
GetStdHandle
GetCurrentProcess
CreateEventA
ResetEvent
SetEvent
GetVersionExA
WaitForMultipleObjects
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
MultiByteToWideChar
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapReAlloc
HeapAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
ExitThread
CreateThread
LCMapStringA
LCMapStringW
GetCPInfo
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
SetHandleCount
GetFileType
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetACP
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapSize
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
ReadFile
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetProcAddress
pm
?OnPowerChange@ppbe@cyberpower@@YA_NIPAX@Z
ppbedrvc
?SetDriverContext@ppbe@cyberpower@@YAX_NPAX@Z
?OnDeviceChange@ppbe@cyberpower@@YA_NIPAX@Z
ppbedc
?WaitDaemonTerminate@ppbe@cyberpower@@YAXXZ
?SignalDaemonTerminate@ppbe@cyberpower@@YAXXZ
user32
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
PostMessageA
FindWindowA
PostQuitMessage
DestroyWindow
DefWindowProcA
GetPropA
SetPropA
CreateWindowExA
RegisterClassExA
CallWindowProcA
advapi32
StartServiceCtrlDispatcherA
SetServiceStatus
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ