Static task
static1
Behavioral task
behavioral1
Sample
8b46dc93a704630ffede1eb67dea9404.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b46dc93a704630ffede1eb67dea9404.exe
Resource
win10v2004-20231215-en
General
-
Target
8b46dc93a704630ffede1eb67dea9404
-
Size
592KB
-
MD5
8b46dc93a704630ffede1eb67dea9404
-
SHA1
774e5e72a0f8b5598aecf2486861ca16ab20ca89
-
SHA256
90359b05fd32e39daa5ef4863ab9f84c868dd0e3a9c3ddb6524d7f72655aaffa
-
SHA512
1d436af6e889fcfa71e9dd21c9592f0c02c8ee1220b617e948c58ce1209fee3d75b37c5bc46b4bbb96ca1d9e0e32945150a091a4106a344440470201e6eeb43e
-
SSDEEP
6144:0UvNDfQcx92YE2GsDfbj8nNuMwScEfWVVKlxNWenL2h7Lz4EXQKSS/tsscccL9B7:0UMV7NzWenL2tzVXYS/tucW7Sa/0Kw+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b46dc93a704630ffede1eb67dea9404
Files
-
8b46dc93a704630ffede1eb67dea9404.exe windows:4 windows x86 arch:x86
103b7d4b97053b3a787053bd89462a13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyW
CryptHashSessionKey
LookupSecurityDescriptorPartsW
RegLoadKeyA
RegEnumKeyW
LookupSecurityDescriptorPartsA
RegLoadKeyW
RegSetValueExA
RegCreateKeyA
CryptGetProvParam
RegCreateKeyExA
RegOpenKeyExA
CryptDuplicateKey
ReportEventW
CryptGetKeyParam
CryptSetKeyParam
GetUserNameW
RegEnumKeyExW
CryptSignHashA
CryptGetDefaultProviderA
StartServiceW
comctl32
ImageList_AddMasked
CreateStatusWindowW
CreateToolbarEx
CreateStatusWindow
ImageList_Merge
CreateStatusWindowA
ImageList_SetImageCount
ImageList_Copy
ImageList_EndDrag
ImageList_DrawIndirect
ImageList_DrawEx
ImageList_Create
ImageList_DragLeave
ImageList_Destroy
DrawStatusTextA
ImageList_LoadImageA
CreateMappedBitmap
ImageList_SetDragCursorImage
ImageList_Add
InitCommonControlsEx
user32
DestroyCursor
EnableMenuItem
GetDlgItemTextW
ExitWindowsEx
MapVirtualKeyA
SetDlgItemTextA
RealGetWindowClass
ShowWindowAsync
IsCharAlphaA
GetScrollPos
SetWindowLongA
DefWindowProcW
FreeDDElParam
EnumThreadWindows
GetMessageExtraInfo
GetClipboardOwner
DestroyWindow
GetThreadDesktop
CharToOemW
CreateWindowExA
DestroyMenu
PostQuitMessage
RegisterClassExA
PaintDesktop
MapDialogRect
DdeAddData
CharUpperW
PeekMessageW
UnhookWinEvent
MapVirtualKeyExA
GetMonitorInfoA
RemovePropA
CreateWindowStationA
GetWindowTextLengthW
GetShellWindow
DdeCreateStringHandleA
OpenInputDesktop
GetSysColor
SetMenuItemInfoW
GetDC
MessageBoxW
GetClipboardData
DlgDirListW
BroadcastSystemMessageW
RegisterDeviceNotificationA
WaitForInputIdle
GetKBCodePage
CloseWindow
ReplyMessage
GetCursorPos
ShowWindow
ShowCursor
CreateWindowExW
CharToOemA
CharPrevA
RegisterClassExW
DdeQueryConvInfo
DdeInitializeA
LoadBitmapA
SetRect
GetMessageA
GetListBoxInfo
DefDlgProcA
DdeGetData
ExcludeUpdateRgn
CopyRect
MessageBoxIndirectW
LoadAcceleratorsA
WindowFromDC
TranslateAcceleratorA
DefMDIChildProcW
LoadAcceleratorsW
FlashWindowEx
FindWindowW
FindWindowExA
GetCursorInfo
CallMsgFilterA
SetMenuItemBitmaps
wsprintfW
ToAsciiEx
TranslateAccelerator
ChangeDisplaySettingsExW
CopyIcon
SetClassLongA
GetDlgItemInt
CreateDialogParamA
EnumWindowStationsA
CreatePopupMenu
CharLowerBuffW
WINNLSGetEnableStatus
ChangeDisplaySettingsExA
ChangeMenuW
ChangeMenuA
GetNextDlgGroupItem
VkKeyScanW
RegisterClassA
LoadStringA
CallWindowProcA
GetWindowDC
ScrollWindow
kernel32
VirtualFree
GetFileType
LeaveCriticalSection
VirtualAlloc
GetCalendarInfoA
WideCharToMultiByte
InterlockedExchange
SetStdHandle
DeleteCriticalSection
TlsSetValue
InitializeCriticalSection
GetVersion
GetTickCount
TlsFree
CompareStringA
GetSystemTime
VirtualQuery
LoadLibraryA
SetHandleCount
SetFilePointer
GetSystemDirectoryA
GetLastError
SetCurrentDirectoryW
UnhandledExceptionFilter
LCMapStringW
WriteProfileSectionW
GetModuleFileNameW
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathW
LCMapStringA
GetStringTypeA
UnlockFileEx
GetCurrentThread
MultiByteToWideChar
EnumSystemLocalesA
GetCurrentThreadId
GetCPInfo
ConvertDefaultLocale
IsBadWritePtr
GetTimeZoneInformation
TlsAlloc
GetModuleFileNameA
TerminateProcess
ExitProcess
SetLastError
HeapAlloc
GetModuleHandleA
SetEnvironmentVariableA
GetEnvironmentStrings
GetCurrentProcess
GlobalFlags
ReadFile
RtlMoveMemory
RtlUnwind
SetConsoleScreenBufferSize
FlushFileBuffers
CompareStringW
GetStartupInfoW
FreeEnvironmentStringsW
CreateMutexA
WriteConsoleInputA
EnterCriticalSection
WriteFile
OpenMutexA
GetProcAddress
GetEnvironmentVariableA
HeapDestroy
GetLocalTime
HeapReAlloc
TlsGetValue
ReadConsoleOutputW
InterlockedDecrement
GetStdHandle
GetEnvironmentStringsW
CloseHandle
GlobalAddAtomW
GetCurrentProcessId
FreeEnvironmentStringsA
GetStartupInfoA
GetCommandLineA
HeapCreate
InterlockedIncrement
HeapFree
FlushViewOfFile
EnumResourceTypesW
QueryPerformanceCounter
GetCommandLineW
Sections
.text Size: 204KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ