Static task
static1
Behavioral task
behavioral1
Sample
8868372888e2d047c290477022dd2f82aaedb2d9b434f8ac89d06ec036d38f6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8868372888e2d047c290477022dd2f82aaedb2d9b434f8ac89d06ec036d38f6a.exe
Resource
win10v2004-20231215-en
General
-
Target
8868372888e2d047c290477022dd2f82aaedb2d9b434f8ac89d06ec036d38f6a
-
Size
3.8MB
-
MD5
accb72d72d50aaa75a2b9e6aa1df59fb
-
SHA1
938dd7a7a9e896aeffc09ec90adafed885bd6bad
-
SHA256
8868372888e2d047c290477022dd2f82aaedb2d9b434f8ac89d06ec036d38f6a
-
SHA512
8b3f7e8d4ee354a59b5551cb2ab1cbc6473a0461879b249baca762442c382576bc7283a9d2094a484f4ac664e69e8c81412a41d069240cf936756b9d405d23da
-
SSDEEP
98304:szpXWWlneUTznG/y4VgMJkCKysXTzBynw86BFDOPkiY:IpXfeUTznGa4VgMJnK5pynoTDOP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8868372888e2d047c290477022dd2f82aaedb2d9b434f8ac89d06ec036d38f6a
Files
-
8868372888e2d047c290477022dd2f82aaedb2d9b434f8ac89d06ec036d38f6a.exe windows:6 windows x86 arch:x86
374aef103dde651c6c44e331f362c8b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
GetCurrentDirectoryW
GetCurrentProcessId
CreateProcessW
WideCharToMultiByte
VirtualQuery
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
lstrcmpiW
LoadLibraryExW
WriteFile
SetFileTime
SetFilePointer
CreateFileW
LocalFileTimeToFileTime
SystemTimeToFileTime
UnmapViewOfFile
WriteConsoleW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
LCMapStringW
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
GetStdHandle
GetCommandLineA
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GlobalFlags
MultiByteToWideChar
GetFileAttributesW
FindClose
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
CloseHandle
ReadFile
CreateDirectoryW
FreeLibrary
GetProcAddress
LoadLibraryW
GetTickCount
FindResourceW
LoadResource
LockResource
FreeResource
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
LeaveCriticalSection
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
GetTempPathW
ExitProcess
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
HeapFree
user32
GetClassInfoExW
CharNextW
wsprintfW
DeleteMenu
DestroyAcceleratorTable
PostQuitMessage
TranslateAcceleratorW
GetDlgItem
GetWindowThreadProcessId
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
RegisterClassExW
GetWindowTextW
EndPaint
GetNextDlgTabItem
BeginPaint
DestroyMenu
IsIconic
GetClassNameW
UnregisterClassW
GetFocus
GetActiveWindow
GetDesktopWindow
MessageBoxW
IsWindow
SetFocus
DestroyWindow
DefWindowProcW
DispatchMessageW
TranslateMessage
IntersectRect
IsRectEmpty
WinHelpW
SetMenu
IsWindowEnabled
GetSysColor
IsChild
GetDlgCtrlID
IsDialogMessageW
DrawIcon
FillRect
IsWindowVisible
CallWindowProcW
GetSystemMenu
GetLastActivePopup
GetWindowTextLengthW
DrawTextW
SetWindowRgn
SetRect
IsZoomed
GetTopWindow
ClientToScreen
DestroyIcon
RedrawWindow
ScreenToClient
GetMonitorInfoW
GetMessageW
PeekMessageW
GetWindowLongW
SendMessageW
SetWindowTextW
InvalidateRect
SetWindowPos
SetWindowLongW
GetKeyState
SetCursor
GetWindow
ShowWindow
EnableWindow
AdjustWindowRectEx
ReleaseDC
GetClientRect
GetSystemMetrics
GetDC
GetWindowRect
LoadImageW
GetParent
LoadCursorW
LoadIconW
EnumWindows
PostMessageW
CreateWindowExW
LoadStringW
gdi32
CreateEllipticRgn
CreateSolidBrush
CreateRoundRectRgn
GetClipBox
SetBkMode
SetTextColor
CombineRgn
CreateRectRgn
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GdiAlphaBlend
GetStockObject
GetDeviceCaps
DeleteDC
GetObjectW
SetStretchBltMode
DeleteObject
CreateFontIndirectW
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
DragFinish
DragQueryFileW
Shell_NotifyIconW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
ws2_32
WSACleanup
Sections
.text Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ