Static task
static1
Behavioral task
behavioral1
Sample
89ad3b68ab7a888a0b73209f78ebd416f900cbf030e27d9da671b83476e30dd0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
89ad3b68ab7a888a0b73209f78ebd416f900cbf030e27d9da671b83476e30dd0.exe
Resource
win10v2004-20230915-en
General
-
Target
89ad3b68ab7a888a0b73209f78ebd416f900cbf030e27d9da671b83476e30dd0
-
Size
216KB
-
MD5
9da82bf41206096da830197efcc6d1b4
-
SHA1
a21017329cbfab3dc2afd96bcc54e273a7917aaa
-
SHA256
89ad3b68ab7a888a0b73209f78ebd416f900cbf030e27d9da671b83476e30dd0
-
SHA512
66152d91dd58f3ae5d54fc1146ab1ad2c74a5832b0d01ae168764521c8fa47cdf812737abb9efcf562b740ec9a9b1dc0065a6000b5da505dda43b6b0867cb33a
-
SSDEEP
3072:WYiKr2SzzHWLNkIzltTB4ony0cZ0Rj/U+YwFrK5W0Csg71xI108I:9rbzHWOUTrcyPYamEsgQuH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89ad3b68ab7a888a0b73209f78ebd416f900cbf030e27d9da671b83476e30dd0
Files
-
89ad3b68ab7a888a0b73209f78ebd416f900cbf030e27d9da671b83476e30dd0.exe windows:4 windows x86
a14ce5ef2733d207d4dc03daa69dbf3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
GetCurrentProcess
WriteFile
SetFilePointer
FlushFileBuffers
GetFullPathNameA
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetTimeZoneInformation
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
RaiseException
GetProcessVersion
GetACP
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
FreeLibrary
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
GetProcAddress
SetLastError
lstrcpyA
lstrcatA
WritePrivateProfileStringA
GlobalFlags
GetDriveTypeA
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
lstrlenA
WideCharToMultiByte
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
HeapAlloc
HeapSize
FormatMessageA
LocalFree
FindFirstFileA
FindNextFileA
FindClose
CloseHandle
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
DeleteFileA
CopyFileA
GetLastError
HeapReAlloc
Sleep
user32
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
LoadStringA
DestroyMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
wsprintfA
GetWindow
GetWindowRect
PtInRect
GetClassNameA
ClientToScreen
LoadCursorA
GetCapture
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgCtrlID
GetWindowTextA
SetWindowTextA
GetDlgItem
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
UnregisterClassA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
ScaleViewportExtEx
OffsetViewportOrgEx
SelectObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetViewportExtEx
RestoreDC
SaveDC
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
CreateBitmap
DeleteDC
DeleteObject
GetStockObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ