h:\ifupqvesvh.pdb
Static task
static1
Behavioral task
behavioral1
Sample
89cb47a926902a3275666b41d3d81d32.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
89cb47a926902a3275666b41d3d81d32.exe
Resource
win10v2004-20231215-en
General
-
Target
89cb47a926902a3275666b41d3d81d32
-
Size
564KB
-
MD5
89cb47a926902a3275666b41d3d81d32
-
SHA1
8b0e214f6e7d1663c9f0a7a554c8f6b761b943c1
-
SHA256
c8299e039c50b1fcd2e29634fbe0bcc8372b450a614748700d493c980ec98071
-
SHA512
55c309a54d2a987435acdc8589ed4a9179a3fb58070e231a56b1b19afb38ea34ecb21b1fa11fef5e41edd58778490c3c98d6c762489332ba40b9bf755d03272c
-
SSDEEP
6144:QW5VMhTtBD14ghV8o1iQEUD4yA09uQPnCqBNsh5e7NVREHaG31c3mefYyZbUxNd3:ZwTD142nk8XxCqUhQoj31c3m2DgdOl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89cb47a926902a3275666b41d3d81d32
Files
-
89cb47a926902a3275666b41d3d81d32.exe windows:4 windows x86 arch:x86
45154294b3075847496c7f71abac1f1a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_LoadImage
CreateUpDownControl
ImageList_Add
DrawInsert
CreateStatusWindow
CreateStatusWindowA
ImageList_Draw
DestroyPropertySheetPage
MakeDragList
DrawStatusTextW
InitCommonControlsEx
ImageList_GetIcon
DrawStatusTextA
ImageList_DragEnter
ImageList_SetBkColor
user32
EnumPropsA
DdeReconnect
GetWindowModuleFileNameW
GetClientRect
RegisterClassExA
LoadIconW
MessageBoxA
CharPrevExA
InvertRect
OemToCharA
DdeFreeDataHandle
DdeUninitialize
LookupIconIdFromDirectoryEx
EditWndProc
SetWindowLongA
SetClipboardViewer
wvsprintfA
WindowFromPoint
CheckDlgButton
OemToCharW
GetKeyboardType
SetCaretPos
DdeImpersonateClient
GetScrollPos
ExcludeUpdateRgn
CheckMenuRadioItem
GetDC
SendNotifyMessageW
WINNLSGetIMEHotkey
GetClassInfoA
ActivateKeyboardLayout
SwapMouseButton
UnregisterClassW
GetMenuDefaultItem
ReplyMessage
RemovePropW
DefWindowProcW
DrawFrame
RegisterClassA
IsDialogMessage
GetMessagePos
CharNextA
GetClassInfoExW
MapWindowPoints
UnregisterHotKey
DestroyWindow
BeginDeferWindowPos
CreateWindowExA
TabbedTextOutA
DrawFrameControl
GetDlgCtrlID
ChildWindowFromPointEx
GetKeyboardState
EnumDisplayMonitors
CharToOemBuffA
GetGUIThreadInfo
ShowWindow
GetWindowTextW
CascadeChildWindows
DragObject
CreateDialogIndirectParamW
CheckMenuItem
IsWindowEnabled
OpenClipboard
CallMsgFilterA
OffsetRect
GetInputState
SetMenuContextHelpId
CharLowerBuffW
GetParent
IsCharAlphaW
SetRectEmpty
SetWindowWord
gdi32
DeleteDC
GetDeviceCaps
GetObjectA
SelectObject
CreateDCA
ExtTextOutA
kernel32
WritePrivateProfileSectionA
HeapDestroy
GetSystemTimeAsFileTime
HeapCreate
SetEnvironmentVariableA
GetCurrentThread
SetConsoleCursorInfo
EnumSystemCodePagesA
ExitProcess
EnumSystemLocalesW
lstrcmpiW
CopyFileExA
GetEnvironmentStringsW
GetFileAttributesExW
InterlockedDecrement
GetTimeZoneInformation
GetPriorityClass
WaitForMultipleObjects
InitializeCriticalSectionAndSpinCount
TlsSetValue
RaiseException
WriteProfileStringW
LeaveCriticalSection
CompareStringA
EnterCriticalSection
WritePrivateProfileStructA
GetStringTypeA
GetStdHandle
GetCommandLineA
GetEnvironmentStrings
SetFileAttributesA
LocalFree
UnhandledExceptionFilter
GetPrivateProfileStructA
GetEnvironmentStringsA
WritePrivateProfileStringW
VirtualFree
PulseEvent
GetConsoleOutputCP
GetStartupInfoA
GetCPInfo
SetFilePointer
CreateMutexW
GetPrivateProfileIntA
CreateRemoteThread
GetProfileIntW
GetTickCount
EnumDateFormatsExA
WriteProfileSectionA
GlobalUnlock
OpenMutexW
CompareStringW
ReadFile
FlushFileBuffers
CreateMutexA
ReadFileEx
SetThreadAffinityMask
GetACP
LoadLibraryA
GetProcAddress
InitializeCriticalSection
GetModuleHandleA
GetCurrencyFormatW
SetLastError
GetCurrentThreadId
WriteConsoleOutputAttribute
GetTempPathW
TlsGetValue
CreateProcessA
GetSystemTime
GetPrivateProfileSectionW
CloseHandle
TerminateProcess
TlsAlloc
GetProfileIntA
GetFileAttributesA
LoadModule
IsBadWritePtr
GetCurrentProcessId
QueryPerformanceCounter
GetLogicalDriveStringsA
LCMapStringA
GetMailslotInfo
GetVersion
InterlockedExchange
EnumDateFormatsExW
SleepEx
GetThreadSelectorEntry
WriteFile
HeapFree
OpenSemaphoreW
HeapAlloc
GetNumberFormatA
GetDiskFreeSpaceW
GetFullPathNameA
DebugBreak
HeapReAlloc
LCMapStringW
GetModuleFileNameA
GetSystemDirectoryA
SetThreadContext
DeleteCriticalSection
GetStringTypeW
TlsFree
lstrlenA
VirtualQuery
GetExitCodeThread
ConnectNamedPipe
GetStringTypeExW
GetLocalTime
SetLocalTime
FreeEnvironmentStringsW
GetLastError
GetEnvironmentVariableW
lstrcpynA
FillConsoleOutputCharacterW
GetLocaleInfoA
GetCurrencyFormatA
OpenFile
FreeEnvironmentStringsA
ResetEvent
VirtualAlloc
GetFileType
WideCharToMultiByte
SetStdHandle
GlobalGetAtomNameW
GetOEMCP
OpenMutexA
SetComputerNameA
FileTimeToLocalFileTime
MultiByteToWideChar
ReadConsoleInputW
HeapValidate
SetHandleCount
GetCurrentProcess
CreateFileMappingA
lstrcmpiA
GlobalFix
TerminateThread
RtlUnwind
GetShortPathNameW
InterlockedIncrement
shell32
InternalExtractIconListA
SHGetPathFromIDListA
ExtractIconW
InternalExtractIconListW
SHGetInstanceExplorer
advapi32
CryptGenRandom
LookupPrivilegeValueA
RegOpenKeyW
RegEnumKeyW
comdlg32
ReplaceTextA
FindTextA
PrintDlgW
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ