Static task
static1
Behavioral task
behavioral1
Sample
880590e823de441d4c2f1b27accc5fec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
880590e823de441d4c2f1b27accc5fec.exe
Resource
win10v2004-20231215-en
General
-
Target
880590e823de441d4c2f1b27accc5fec
-
Size
806KB
-
MD5
880590e823de441d4c2f1b27accc5fec
-
SHA1
dea71044ee08aad19d728ec07ce5ce15f5ed47b6
-
SHA256
dd70218961c19ae3b57c96a1ef308421936951790cc360e8e5c1499e31786d62
-
SHA512
3791bda74103aaf75c455ff0c31de9cb03e037ad2e24fbd322589d14c29792f6e276713fb947d6f22a9e5c1c530bd8d4b4ebaa3951d1fb31a3377eac15615817
-
SSDEEP
12288:HXD5crNGfd5m0rYeCBqE+/Fa6ej4cWV3zmPyVi4TnB1lW9fth6bvupvwvO:HXD5cwjwm/TwQ3yPuBmUv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 880590e823de441d4c2f1b27accc5fec
Files
-
880590e823de441d4c2f1b27accc5fec.exe windows:4 windows x86 arch:x86
c1b8c5e56d964d4d707c2ec7b7655220
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetActiveWindow
GetCursorPos
IsWindowVisible
PostMessageW
GetSystemMetrics
GetDlgItem
EndDialog
ValidateRect
SetWindowContextHelpId
GetSysColorBrush
ModifyMenuW
LoadBitmapW
GetDesktopWindow
IsIconic
GetFocus
DrawIcon
GetMenuState
PeekMessageW
SetWindowPos
GetMenuCheckMarkDimensions
MessageBeep
DestroyWindow
CreateDialogIndirectParamW
EnableWindow
SetMenu
GetNextDlgGroupItem
GetActiveWindow
CreateWindowExW
GetWindow
PostQuitMessage
SetTimer
IsWindow
GetClientRect
DispatchMessageW
IsWindowEnabled
CheckMenuItem
GetKeyState
GetNextDlgTabItem
SetMenuItemBitmaps
InvalidateRgn
EnableMenuItem
MapDialogRect
GetParent
GetWindowLongW
UpdateWindow
TranslateMessage
msvcrt
_cexit
_initterm
_initterm
iswdigit
__p__fmode
log
_wtoi64
__set_app_type
__setusermatherr
?terminate@@YAXXZ
memcpy
_controlfp
_exit
exit
__wgetmainargs
memset
_wcmdln
__p__commode
_amsg_exit
_XcptFilter
ddraw
DirectDrawCreate
DirectDrawCreateEx
kernel32
lstrlenA
IsProcessorFeaturePresent
LocalAlloc
MultiByteToWideChar
LocalFree
InterlockedIncrement
InterlockedExchange
VirtualFree
GetProcAddress
GetLastError
GetLocaleInfoA
CreateThread
SizeofResource
GetSystemDirectoryW
GetSystemInfo
lstrlenW
LeaveCriticalSection
DeleteCriticalSection
GetComputerNameW
InterlockedCompareExchange
GetVersionExA
WaitForSingleObject
LCMapStringW
MulDiv
VirtualUnlock
WideCharToMultiByte
TerminateProcess
LockResource
OpenProcess
RaiseException
WaitForMultipleObjects
HeapReAlloc
lstrcmpW
IsDebuggerPresent
SetUnhandledExceptionFilter
GetProcessId
HeapSetInformation
HeapFree
GetVersionExW
GetModuleHandleA
ReleaseMutex
GlobalHandle
GlobalAlloc
HeapDestroy
GetCurrentThreadId
LoadLibraryExW
InitializeCriticalSection
CloseHandle
SetEvent
FreeLibrary
GetTempPathW
GetACP
FormatMessageW
FindResourceW
InterlockedDecrement
UnhandledExceptionFilter
GlobalLock
GetThreadLocale
VirtualLock
GetLocaleInfoW
GetStartupInfoW
GlobalFree
HeapAlloc
ProcessIdToSessionId
GetCurrentProcess
QueryPerformanceCounter
ResetEvent
GetModuleFileNameW
GetTickCount
CreateMutexW
HeapSize
VirtualAlloc
GetSystemTimeAsFileTime
LoadResource
LoadLibraryW
Sleep
LoadLibraryA
SetLastError
CreateEventW
CreateFileW
FindResourceExW
EnterCriticalSection
FlushInstructionCache
GlobalUnlock
GetModuleHandleW
Sections
.text Size: 441KB - Virtual size: 441KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 327KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ