Static task
static1
Behavioral task
behavioral1
Sample
08d9f42de60d7482b1915cc5fb5235b0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08d9f42de60d7482b1915cc5fb5235b0.exe
Resource
win10v2004-20231222-en
General
-
Target
08d9f42de60d7482b1915cc5fb5235b0
-
Size
237KB
-
MD5
08d9f42de60d7482b1915cc5fb5235b0
-
SHA1
1cde7b6d5cc3cce4be0637ca85a0fe6a00e7ee8d
-
SHA256
54b9220e08a07ffa68fbfb853a1164ae6cee070f1bd8b56be1a985422017251d
-
SHA512
621f1d957259361fa6392dacaa043b1a59e2daba391c7b32d47f30e6053f18695894504e9fa7626368dc6181dfb2c62f2ee5b03d0a6f1de2565de98291ba8fdf
-
SSDEEP
6144:LKuFF5k58rcCmTj0VpCbcR8jxaW35MK9y09:LKYe5VC8j0zCAR45yS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08d9f42de60d7482b1915cc5fb5235b0
Files
-
08d9f42de60d7482b1915cc5fb5235b0.exe windows:4 windows x86 arch:x86
16bfee20d62b44ca6885111677cc6402
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
GetFullPathNameA
QueryPerformanceCounter
CreateEventW
LoadLibraryExA
GetTimeFormatW
GetModuleFileNameW
GlobalFindAtomW
lstrcatA
GetCurrentDirectoryW
EnumTimeFormatsA
GetModuleHandleW
OpenEventA
InitializeCriticalSection
GetLongPathNameA
LocalFree
OpenWaitableTimerW
GetExpandedNameA
DeleteAtom
BeginUpdateResourceW
IsBadStringPtrA
GetLogicalDrives
GetEnvironmentVariableA
TlsAlloc
GetExitCodeThread
GetProcAddress
CreateSemaphoreW
GetVolumeInformationA
WaitForSingleObject
IsValidCodePage
FileTimeToDosDateTime
GetCommandLineA
MoveFileW
GetComputerNameA
lstrcpyn
LoadLibraryA
GetNumberFormatA
DuplicateHandle
FatalAppExitW
lstrlenA
GetVersionExA
lstrcatW
user32
CharNextA
LoadMenuA
RegisterWindowMessageA
GetDlgItemTextA
AppendMenuW
GetTopWindow
DialogBoxParamW
WaitMessage
GetClassInfoExA
GetClassInfoA
WaitForInputIdle
GetMenuItemRect
TrackPopupMenuEx
CreatePopupMenu
WinHelpW
AdjustWindowRect
IsMenu
OpenClipboard
SetCursorPos
EmptyClipboard
SetDlgItemInt
GetMenuInfo
GetSysColorBrush
GetMenuStringA
CreateDesktopA
SetWindowPos
CreateMenu
SetFocus
PostQuitMessage
DialogBoxIndirectParamW
CharNextW
SetWindowTextW
MonitorFromWindow
FindWindowW
GetMenuItemID
LoadIconW
EnumClipboardFormats
RemoveMenu
GetActiveWindow
GetKeyboardType
InsertMenuItemA
CreateDialogParamA
CharPrevW
DestroyIcon
LoadBitmapW
GetMenuStringW
WinHelpA
GetSubMenu
SetWindowLongW
GetForegroundWindow
OffsetRect
MoveWindow
GetActiveWindow
SetActiveWindow
MessageBoxW
MessageBoxA
CreateDialogIndirectParamA
RegisterClassExW
GetFocus
mouse_event
CreateAcceleratorTableW
RegisterClassA
SetCapture
MessageBoxIndirectW
InsertMenuA
SetParent
PeekMessageW
GetWindowRgn
TrackPopupMenu
GetClassInfoW
PostMessageA
MonitorFromPoint
RegisterClassW
LoadCursorW
FindWindowA
EndMenu
LoadIconA
EnumWindows
SetDlgItemTextA
gdi32
CreateFontA
GetMetaFileW
GetRasterizerCaps
CreateScalableFontResourceW
CreateICA
CreatePalette
CreateCompatibleDC
GetTextExtentPointA
CreateMetaFileW
GetStockObject
RemoveFontResourceExW
CreateHatchBrush
ExtCreateRegion
CreateScalableFontResourceA
RemoveFontResourceW
CreateColorSpaceA
CreateBrushIndirect
StretchDIBits
SelectBrushLocal
GetEnhMetaFileW
SetWinMetaFileBits
AddFontResourceW
GdiGetBatchLimit
CreateFontIndirectA
advapi32
DeleteService
CryptGenRandom
RegReplaceKeyA
MapGenericMask
GetSecurityInfo
AddAuditAccessAce
GetInformationCodeAuthzLevelW
AccessCheckByTypeResultListAndAuditAlarmByHandleW
CryptSetProvParam
CredEnumerateA
SetSecurityDescriptorGroup
ElfOldestRecord
ChangeServiceConfig2A
RegQueryValueA
CredReadDomainCredentialsA
shell32
StrRStrA
ExtractIconW
SHGetDiskFreeSpaceExA
ExtractIconA
StrRChrW
SHGetDiskFreeSpaceA
FreeIconList
Shell_NotifyIcon
ShellExecuteA
SHGetFolderLocation
DuplicateIcon
StrCmpNW
StrStrW
StrChrIA
ExtractAssociatedIconW
Shell_NotifyIconA
oleaut32
VarI8FromUI1
VarBstrFromBool
ws2_32
socket
Sections
.rpEPMN Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DhXX Size: 2KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vQPpJ Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FpRL Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BFJtgY Size: 5KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.EPcCp Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hQm Size: 11KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DML Size: 1024B - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ