Static task
static1
Behavioral task
behavioral1
Sample
08400df0fd50928471e2cb236b2cb60a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
08400df0fd50928471e2cb236b2cb60a.exe
Resource
win10v2004-20231222-en
General
-
Target
08400df0fd50928471e2cb236b2cb60a
-
Size
162KB
-
MD5
08400df0fd50928471e2cb236b2cb60a
-
SHA1
ebd15407654b0a6a4da3eb66b6a62c4bc55f7ec9
-
SHA256
e8211f126c6ecfcd9b016c1ff3f1ed882cbec53d713366d456fd56d3dcab75bb
-
SHA512
b192a968a6d58bf13367d35c02d4e2f12d6a7a2d12ab055466a1fbb854c1de71be67985b57945d77795547f534a48cf4babfca572e929f7973811fcc606f9afd
-
SSDEEP
3072:xCtV+SFWCqTF8d1trQMqiM3NJyXupUMVWBjWolWxo2c0q:MmUr3qfNJ2i9W80mo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08400df0fd50928471e2cb236b2cb60a
Files
-
08400df0fd50928471e2cb236b2cb60a.exe windows:4 windows x86 arch:x86
eaf7ef02bcbdbba54aede9ba170eb230
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
memcmp
strlen
strrchr
memcpy
free
_except_handler3
ntdll
RtlUnwind
kernel32
SetStdHandle
ReadProcessMemory
FreeLibrary
CreateThread
GetExitCodeThread
SetHandleCount
IsBadReadPtr
SetErrorMode
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
SetFilePointer
GetEnvironmentStringsW
GetEnvironmentStringsA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
FlushFileBuffers
ReadFile
GetStartupInfoA
VirtualAlloc
CloseHandle
GetLastError
GetCurrentProcess
LockResource
SizeofResource
LoadResource
FindResourceA
CreateFileA
SetLastError
GetProcAddress
GetModuleHandleA
LocalFree
FormatMessageA
DeviceIoControl
GetDriveTypeA
OpenProcess
lstrcpyA
DuplicateHandle
GetCurrentProcessId
DeleteFileA
GetSystemDirectoryA
GetConsoleScreenBufferInfo
GetStdHandle
WaitForSingleObject
CreateProcessA
GetCommandLineA
ExpandEnvironmentStringsA
GetFileAttributesA
GetModuleFileNameA
GetVersion
HeapFree
HeapAlloc
WriteFile
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetFileType
user32
LoadCursorW
IsClipboardFormatAvailable
DialogBoxParamW
GetSubMenu
DrawTextW
IsChild
GetWindowRect
ScreenToClient
SetFocus
HideCaret
TranslateAcceleratorW
CloseClipboard
SetCursor
DestroyWindow
LoadAcceleratorsW
SetDlgItemInt
GetMenu
IsDialogMessageW
LoadIconW
OffsetRect
TrackPopupMenuEx
CheckMenuRadioItem
InvalidateRect
LoadMenuW
GetWindowLongW
GetClipboardData
GetWindowTextW
SystemParametersInfoW
CheckMenuItem
DefWindowProcW
CallWindowProcW
GetProcessDefaultLayout
SetWindowTextW
GetDlgCtrlID
DestroyMenu
EnableWindow
UpdateWindow
MapWindowPoints
SendMessageW
SetDlgItemTextW
SetProcessDefaultLayout
OpenClipboard
CheckRadioButton
CreateWindowExW
CreateDialogParamW
GetSysColorBrush
SetMenu
ShowWindow
CheckDlgButton
LoadStringW
SetWindowPos
GetSysColor
GetDesktopWindow
EndDialog
SetWindowLongW
GetDlgItem
EnableMenuItem
GetClientRect
Sections
.text Size: 82KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ctext Size: 74KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 568B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE