Static task
static1
Behavioral task
behavioral1
Sample
508cb6205b2774a269e0a49586f807fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
508cb6205b2774a269e0a49586f807fe.exe
Resource
win10v2004-20231215-en
General
-
Target
508cb6205b2774a269e0a49586f807fe
-
Size
428KB
-
MD5
508cb6205b2774a269e0a49586f807fe
-
SHA1
ecdb1e75ec1df7021e2b8f40a36b5b8467a97607
-
SHA256
e17b8c9a2631e82fa576c3fc0d5d0657646c221bdc27f9794eefc2cb423cfa4c
-
SHA512
ccc0414bc920152d6f43859fe99e9aa34eecf2d3cdbb284a3535aa60923566ca8d19d08c8d36482df3624d0c7842218ca73a821f75a3532e06f93f0cd49a0336
-
SSDEEP
12288:OuCaH4eroQ07l7F0lxw3u7/FataRUAC3XQOE0EokTOudyyR:ON+0JFsxww/MaR5C3XQOvEoXg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 508cb6205b2774a269e0a49586f807fe
Files
-
508cb6205b2774a269e0a49586f807fe.exe windows:4 windows x86 arch:x86
f347e3fbe0231e42a719298066865bd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
EndDoc
GetTextExtentExPointA
DrawEscape
user32
ChangeMenuW
DeferWindowPos
DdeUninitialize
AnimateWindow
GetAncestor
RemovePropW
ShowCursor
LoadIconW
LockWindowUpdate
SetShellWindow
OemToCharA
SetDlgItemTextW
SetLastErrorEx
GetThreadDesktop
RegisterHotKey
UnregisterClassA
DdeKeepStringHandle
DrawFocusRect
GetKeyboardLayoutNameA
CloseDesktop
wininet
DeleteUrlCacheEntryA
FtpFindFirstFileW
HttpOpenRequestW
InternetSetCookieA
DeleteUrlCacheContainerA
FtpOpenFileA
HttpSendRequestExA
IsHostInProxyBypassList
DeleteIE3Cache
FindFirstUrlCacheEntryA
IncrementUrlCacheHeaderData
InternetHangUp
InternetShowSecurityInfoByURL
HttpEndRequestA
FtpGetFileEx
FindFirstUrlCacheContainerA
InternetGetCertByURL
FindFirstUrlCacheEntryExA
GopherGetAttributeW
ShowCertificate
RegisterUrlCacheNotification
InternetFortezzaCommand
GetUrlCacheEntryInfoExA
InternetCrackUrlW
shell32
SHGetSettings
kernel32
TerminateProcess
GetCurrentThread
HeapCreate
GetTickCount
ExitProcess
VirtualAlloc
TlsGetValue
FreeEnvironmentStringsA
GetEnvironmentStringsW
TlsAlloc
UnhandledExceptionFilter
GetCommandLineA
GetDateFormatA
InterlockedExchange
DeleteCriticalSection
LeaveCriticalSection
LCMapStringA
LCMapStringW
GetCurrentProcess
GetSystemInfo
IsBadWritePtr
GetLocaleInfoA
CompareStringA
GetFileSize
HeapReAlloc
GetEnvironmentVariableA
GetVersionExA
GetStdHandle
GetStringTypeW
VirtualQuery
FreeEnvironmentStringsW
GetModuleFileNameA
GetCommandLineW
GetCPInfo
InitializeCriticalSection
WideCharToMultiByte
WriteFile
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameW
GetThreadContext
TlsFree
GetTimeFormatA
GetACP
EnumSystemLocalesA
GetSystemTimeAsFileTime
LoadLibraryA
GetEnvironmentStrings
GetStartupInfoA
CompareStringW
GetProfileIntA
GetThreadTimes
HeapFree
VirtualFree
QueryPerformanceCounter
GetUserDefaultLCID
GetFileType
GetModuleHandleA
HeapSize
SetLastError
VirtualProtect
GetTimeZoneInformation
IsValidLocale
HeapDestroy
GetLastError
GetProcAddress
MultiByteToWideChar
GetStringTypeA
IsValidCodePage
SetEnvironmentVariableA
GetCurrentProcessId
HeapAlloc
GetStartupInfoW
WaitForMultipleObjects
SetHandleCount
GetLocaleInfoW
CreateSemaphoreA
TlsSetValue
RtlUnwind
EnterCriticalSection
GetOEMCP
advapi32
RegReplaceKeyW
CreateServiceW
CryptSetHashParam
CryptHashData
LookupPrivilegeDisplayNameW
ReportEventW
CryptEnumProvidersW
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ