Static task
static1
Behavioral task
behavioral1
Sample
8ebf50de07b13142ac81c42b37d6f92c8b8dd1031c79b481244e83c840b3f446.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8ebf50de07b13142ac81c42b37d6f92c8b8dd1031c79b481244e83c840b3f446.exe
Resource
win10v2004-20231020-en
General
-
Target
8ebf50de07b13142ac81c42b37d6f92c8b8dd1031c79b481244e83c840b3f446
-
Size
680KB
-
MD5
dbd3e3fd1137901b22b244dc854226e4
-
SHA1
f5a02216855513421e5530b156638bd98f25e85a
-
SHA256
8ebf50de07b13142ac81c42b37d6f92c8b8dd1031c79b481244e83c840b3f446
-
SHA512
2202223ea5d198f55c99fd0cb51986793ed49f6dd97c42becaa225132efc16cbc1f9a87805acb253114e234af6ec2efcd4090a5b34aa0e8b3a10781f284b45b8
-
SSDEEP
12288:uYaIAz/BlNg/G5kNFPIlPPPPPPPPPPPPPP:uYaIAz/BlNDeFPIlPPPPPPPPPPPPPP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ebf50de07b13142ac81c42b37d6f92c8b8dd1031c79b481244e83c840b3f446
Files
-
8ebf50de07b13142ac81c42b37d6f92c8b8dd1031c79b481244e83c840b3f446.exe windows:4 windows x86 arch:x86
08475b1aa068dba47b3c9ea2af2b8c60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
HeapFree
RaiseException
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
GetStdHandle
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
PeekNamedPipe
GetFileInformationByHandle
GetProfileStringA
LoadLibraryExA
InterlockedCompareExchange
InterlockedExchange
GetFileTime
GetFileSize
GetFileAttributesA
GetOEMCP
GetCPInfo
GetProcessVersion
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
LocalAlloc
MulDiv
SetLastError
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
LocalFree
LoadLibraryA
FreeLibrary
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
GlobalUnlock
GlobalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateFileA
GetComputerNameA
GetTempPathA
GetTempFileNameA
MoveFileA
Sleep
EnterCriticalSection
LeaveCriticalSection
lstrcmpA
InitializeCriticalSection
CreateThread
FindResourceA
SizeofResource
LoadResource
LockResource
TerminateThread
WaitForMultipleObjects
ResumeThread
SuspendThread
GetLocalTime
GetModuleHandleA
lstrcpyA
lstrcatA
CreateEventA
GetLastError
SetHandleCount
user32
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
InflateRect
InvalidateRect
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
ClientToScreen
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
MessageBoxA
EnableWindow
wsprintfA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
ValidateRect
IsWindowVisible
PeekMessageA
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
CharUpperA
ShowWindow
MoveWindow
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
PostQuitMessage
SetWindowTextA
DialogBoxParamA
GetDlgItem
EndDialog
LoadMenuA
GetCursorPos
GetSubMenu
TrackPopupMenu
LoadImageA
LoadIconA
DrawFocusRect
DefDlgProcA
CreateWindowExA
GetWindowRect
GetParent
PostMessageA
SendMessageA
KillTimer
SetTimer
IsWindowUnicode
CharNextA
DefWindowProcA
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
SetViewportOrgEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
SetMapMode
SetBkMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateSolidBrush
comdlg32
GetFileTitleA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ExtractIconA
ShellExecuteExA
comctl32
ord17
ImageList_Destroy
ImageList_Create
ImageList_ReplaceIcon
urlmon
URLOpenBlockingStreamA
shlwapi
PathStripPathA
netapi32
Netbios
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 508KB - Virtual size: 504KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ