d:\ex
Static task
static1
Behavioral task
behavioral1
Sample
8b14af742d3667583bb0e529294ad3df.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8b14af742d3667583bb0e529294ad3df.exe
Resource
win10v2004-20231222-en
General
-
Target
8b14af742d3667583bb0e529294ad3df
-
Size
604KB
-
MD5
8b14af742d3667583bb0e529294ad3df
-
SHA1
32a0f542fd7976942829a527b4b33df0df2dc9eb
-
SHA256
b57ec127953f36854fa09ff2dc9beea0f80525a9814ee20d77a61692088d9a5e
-
SHA512
522870e4b6a620e03017edfaaa401f3e04f5777c4474e949e5790fa2151891b42b295f60d53244da7f30a4e1f05e9e9c51ba879d1df68c4747375698e149d4dd
-
SSDEEP
12288:a1qwQfHpug2z/zTTfTa6/f2A/l7ImL6dEgLrZZTEZ7cjG3:aQhu13raU2olVL6GgLrLTU70C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b14af742d3667583bb0e529294ad3df
Files
-
8b14af742d3667583bb0e529294ad3df.exe windows:4 windows x86 arch:x86
2a173b98227da8bdbbad862e28cad2d7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_SetDragCursorImage
DrawInsert
ImageList_Draw
DrawStatusTextA
InitCommonControlsEx
ImageList_GetFlags
ImageList_Destroy
shell32
SHGetDataFromIDListA
ExtractIconExA
advapi32
RegQueryMultipleValuesW
GetUserNameW
CryptDuplicateHash
CryptEnumProviderTypesW
RegQueryValueW
LookupAccountSidA
CryptSetProviderExW
RegEnumValueA
RegDeleteValueA
CryptGenKey
RegEnumValueW
LookupAccountNameW
RegEnumKeyW
LookupSecurityDescriptorPartsW
comdlg32
ChooseColorA
ChooseFontA
GetFileTitleW
user32
SetWindowContextHelpId
KillTimer
RegisterClassExA
DdeFreeStringHandle
DrawAnimatedRects
UpdateWindow
EnumThreadWindows
MessageBeep
DdeAbandonTransaction
CharToOemW
GetSysColorBrush
OemToCharBuffA
GetClipboardData
GetPropA
DrawTextA
SendDlgItemMessageA
MessageBoxA
GetDC
MapVirtualKeyExA
ValidateRgn
AppendMenuW
IsWindow
RegisterClipboardFormatA
GetUpdateRect
OpenDesktopA
UnregisterClassA
GetInputState
FrameRect
GetDesktopWindow
ArrangeIconicWindows
DlgDirListComboBoxW
GetKeyNameTextW
SetClassLongA
EnumPropsExW
SetScrollPos
CreateWindowExA
InsertMenuItemA
SendNotifyMessageW
LoadIconA
GetCaretPos
TrackPopupMenuEx
RemovePropA
InSendMessage
GetSubMenu
DdeSetQualityOfService
RegisterClassW
GetClipboardFormatNameA
GetWindowModuleFileNameW
SetClassWord
DefWindowProcW
IsCharUpperW
SwitchDesktop
BroadcastSystemMessageA
SetCaretPos
EnumPropsExA
SetLastErrorEx
GetWindowModuleFileNameA
InvertRect
GetScrollBarInfo
ShowWindow
ChangeDisplaySettingsW
SetWindowPos
GetWindowTextLengthW
VkKeyScanA
CharToOemBuffA
LoadAcceleratorsA
LoadMenuIndirectA
RemovePropW
CheckMenuRadioItem
TranslateMessage
DestroyWindow
GetClassNameA
GetWindow
DdeDisconnectList
SetWindowsHookW
SetProcessDefaultLayout
SetClipboardData
WindowFromDC
GetWindowWord
DdeGetLastError
IsZoomed
CreateDialogIndirectParamW
GetAncestor
RegisterClassA
SetCursorPos
ScrollWindowEx
DefWindowProcA
GetSystemMenu
TranslateAcceleratorA
DlgDirListA
EnumWindowStationsW
DdeInitializeA
FillRect
DdeCreateDataHandle
GetClassInfoW
DragDetect
SendIMEMessageExA
CloseWindow
FindWindowW
GetPriorityClipboardFormat
EditWndProc
LookupIconIdFromDirectoryEx
CreateIcon
GetScrollRange
kernel32
GetStringTypeW
FlushFileBuffers
EnumSystemLocalesA
GetStringTypeExW
GetCurrentThreadId
WriteConsoleW
GetTimeFormatW
SetEnvironmentVariableA
lstrcpynW
GetConsoleTitleA
GetFileType
GetConsoleOutputCP
TlsAlloc
ReadFile
OpenFile
GetModuleHandleA
GetDiskFreeSpaceA
ReadConsoleOutputCharacterA
SetCurrentDirectoryW
CompareStringA
CompareStringW
GetModuleFileNameA
SetConsoleTitleA
HeapDestroy
InterlockedDecrement
lstrcpyA
IsDebuggerPresent
HeapAlloc
GetCPInfo
GetModuleFileNameW
LocalCompact
VirtualQuery
GetTimeZoneInformation
CreateThread
InitializeCriticalSectionAndSpinCount
TlsGetValue
GetSystemTimeAdjustment
RtlMoveMemory
MapViewOfFileEx
GetTickCount
WriteConsoleA
SetConsoleCtrlHandler
FindFirstFileExW
GetEnvironmentStringsW
LoadLibraryA
SetLastError
MultiByteToWideChar
DeleteCriticalSection
SetConsoleScreenBufferSize
VirtualFree
GetCurrentProcess
WideCharToMultiByte
WriteProfileStringW
GetProfileSectionA
ReadFileEx
GetCommandLineW
CommConfigDialogW
WritePrivateProfileSectionA
IsValidLocale
GetStartupInfoA
GetStringTypeA
IsValidCodePage
GetACP
FreeEnvironmentStringsW
GetSystemDirectoryA
GetOEMCP
FindNextFileA
GetComputerNameA
EnterCriticalSection
SetStdHandle
GetConsoleMode
GetLocaleInfoA
GetModuleHandleW
GetShortPathNameA
CreateDirectoryExW
GetPrivateProfileStructA
GetEnvironmentStrings
LCMapStringW
LeaveCriticalSection
FindAtomW
SetFilePointer
GetLogicalDriveStringsW
CreateMutexW
ExitProcess
GetVersion
FreeLibrary
GetProfileIntA
VirtualUnlock
EnumResourceLanguagesW
CloseHandle
GlobalHandle
TerminateProcess
OpenProcess
GetProcAddress
InterlockedCompareExchange
CreateFileA
GetProfileSectionW
EnumSystemLocalesW
WriteFile
lstrcatW
MapViewOfFile
SetUnhandledExceptionFilter
HeapCreate
GetUserDefaultLCID
HeapFree
TlsSetValue
RtlZeroMemory
GetTimeFormatA
GetStdHandle
SetWaitableTimer
GetConsoleCP
lstrcpynA
lstrlenA
GetFullPathNameA
GlobalDeleteAtom
FileTimeToLocalFileTime
GetThreadContext
HeapSize
RtlUnwind
WaitNamedPipeW
GetPrivateProfileIntA
GetCurrentProcessId
GetDriveTypeA
GetVersionExA
GetNumberFormatW
CreateMutexA
HeapLock
HeapReAlloc
Sleep
OpenMutexA
GetCurrentThread
GetStartupInfoW
GetCommandLineA
GlobalFree
QueryPerformanceCounter
GetLocaleInfoW
LCMapStringA
InterlockedIncrement
VirtualAlloc
FindFirstFileA
GlobalGetAtomNameA
GetDateFormatA
WaitForSingleObjectEx
InterlockedExchange
GetSystemTimeAsFileTime
SetHandleCount
WaitNamedPipeA
GetLastError
TlsFree
UnhandledExceptionFilter
SystemTimeToTzSpecificLocalTime
wininet
DeleteUrlCacheContainerA
FindCloseUrlCache
IsHostInProxyBypassList
InternetShowSecurityInfoByURL
SetUrlCacheEntryGroup
GopherCreateLocatorW
CreateUrlCacheEntryW
Sections
.text Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 272KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ