Static task
static1
Behavioral task
behavioral1
Sample
8b066129253bbba98b689178fd2b725d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b066129253bbba98b689178fd2b725d.exe
Resource
win10v2004-20231215-en
General
-
Target
8b066129253bbba98b689178fd2b725d
-
Size
83KB
-
MD5
8b066129253bbba98b689178fd2b725d
-
SHA1
376e25b64a407b1318a526365f8fe9efdc7756e8
-
SHA256
75810fd88d6097fa07097051863f1c5d68c1cdc07c26d86ee66a14ee3b0157fd
-
SHA512
8aa7cd86340a29bcd413954258ebefd43b776d8624682f133ad48a42ab265cf029620722103d2fd545bfb3d82c8b1176195bb2b71edda7e6815d0f934562945f
-
SSDEEP
1536:N7WqL4PDtX0AHMrChLwclw/1WoN83ySkcHr4V8K:zL4PDtX0hcOlN8CS1cV8K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b066129253bbba98b689178fd2b725d
Files
-
8b066129253bbba98b689178fd2b725d.exe windows:1 windows x86 arch:x86
a6907c8b9436576eb589ceea83c0d7b5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OffsetRect
ValidateRect
CheckDlgButton
SetWindowsHookExW
GetWindowTextLengthW
GetClassNameW
GetMessageW
MapWindowPoints
SystemParametersInfoW
GetWindowRect
LoadCursorA
GetWindow
GetSysColorBrush
DrawEdge
SetWindowsHookExA
SetFocus
SetWindowTextA
GetTopWindow
CharUpperA
SendMessageA
GetSystemMenu
IsWindow
EnumWindows
LoadImageW
PeekMessageA
GetCursorPos
IsDlgButtonChecked
BringWindowToTop
CreateWindowExA
UpdateWindow
RedrawWindow
kernel32
VirtualAlloc
FindFirstFileW
GetEnvironmentStringsW
GetCommandLineW
GetProcessHeap
ExpandEnvironmentStringsW
LoadLibraryA
GetFileType
GetConsoleOutputCP
GetLocaleInfoA
SetStdHandle
GetCurrentDirectoryA
GetModuleFileNameA
GetUserDefaultLCID
GetDateFormatA
LoadLibraryExW
lstrcpyW
MoveFileA
OpenProcess
GlobalAlloc
CreateSemaphoreW
GetVersionExA
FindResourceW
FormatMessageW
GetPrivateProfileStringA
GetFullPathNameA
DuplicateHandle
QueryPerformanceFrequency
MulDiv
CreateFileMappingA
FindNextFileW
CompareStringW
GlobalMemoryStatus
WideCharToMultiByte
CreateEventW
FormatMessageA
CreateThread
FlushFileBuffers
GetVolumeInformationW
DeleteCriticalSection
GetDriveTypeA
CreateProcessW
WaitForSingleObject
EnterCriticalSection
lstrlenW
GetCurrentThread
GetEnvironmentStringsA
RtlUnwind
TerminateProcess
GetSystemDirectoryA
GlobalUnlock
LeaveCriticalSection
GetSystemTimeAsFileTime
FlushInstructionCache
advapi32
RegCreateKeyExW
RegQueryValueExW
RegQueryValueExA
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryInfoKeyW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ