Static task
static1
Behavioral task
behavioral1
Sample
8ce9a3746a2a610e6d9db3e4da6a578a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ce9a3746a2a610e6d9db3e4da6a578a.exe
Resource
win10v2004-20231215-en
General
-
Target
8ce9a3746a2a610e6d9db3e4da6a578a
-
Size
404KB
-
MD5
8ce9a3746a2a610e6d9db3e4da6a578a
-
SHA1
70dd6428393d04f7dbaa1d3a9a9fd5ca12798420
-
SHA256
5cf5122ea3a8a31a8778b28e21350ed9e1455cbb4ae2d40d6f4bb2ec955f63d1
-
SHA512
77de24927450d28d578b4429f480f403c3627544953c3084ec449b1d60b52a249c595ec736fa0a236db2e3e682abce14dd4aea837a307211931ff5867b0d131b
-
SSDEEP
6144:9QztO+1oSoWwzp/BmUx/BqcqDjJHQGcskSY1cyICW6qECBXN6QUFjXp:AITWA/Bv/BqcqDj1csk7SCW6UeT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ce9a3746a2a610e6d9db3e4da6a578a
Files
-
8ce9a3746a2a610e6d9db3e4da6a578a.exe windows:4 windows x86 arch:x86
ee07e0151c57cde29760cb6f3b86b5ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
InitializeCriticalSection
LockFile
InterlockedIncrement
VirtualQuery
LocalLock
CompareStringA
CreateFileW
GetLocaleInfoA
RtlUnwind
EnterCriticalSection
GetConsoleCP
HeapReAlloc
GetPrivateProfileStructA
IsValidLocale
DeleteFileW
HeapFree
GetEnvironmentStringsW
EnumResourceTypesA
TlsAlloc
SetFilePointer
DeleteCriticalSection
GetFullPathNameA
CreateMutexA
lstrcpynA
TerminateProcess
CreateDirectoryW
LCMapStringW
HeapDestroy
RemoveDirectoryW
SetConsoleCursorInfo
InterlockedExchange
PulseEvent
GetEnvironmentVariableA
WriteConsoleA
GetConsoleMode
GetFileType
WriteFile
WaitForDebugEvent
WriteProfileSectionA
GlobalFlags
GetDateFormatW
GetStdHandle
lstrcat
SetFileAttributesA
GetDateFormatA
EnumDateFormatsExA
FreeEnvironmentStringsA
VirtualAlloc
CompareStringW
GetLocaleInfoW
LeaveCriticalSection
IsValidCodePage
InterlockedDecrement
TlsFree
GetTimeZoneInformation
GetEnvironmentStrings
GetCurrentProcessId
OpenProcess
WideCharToMultiByte
UnhandledExceptionFilter
GetCurrentProcess
lstrlenA
HeapSize
DebugBreak
VirtualFree
GetTickCount
TlsGetValue
TransactNamedPipe
FlushFileBuffers
GetProcessHeap
GetVolumeInformationA
SetEnvironmentVariableA
SetLastError
SystemTimeToFileTime
ReadFile
CopyFileExA
LCMapStringA
ResumeThread
GetCommandLineW
GetConsoleOutputCP
SetConsoleCtrlHandler
ReadConsoleOutputA
QueryPerformanceCounter
DeleteAtom
FormatMessageW
CloseHandle
GetPrivateProfileIntA
SetConsoleTitleA
GetCurrentThreadId
UnlockFile
GetShortPathNameW
SetHandleCount
TlsSetValue
MultiByteToWideChar
GetVersionExA
OpenMutexA
LoadResource
GetLastError
FindAtomW
GetCurrentThread
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
EnumSystemLocalesA
IsDebuggerPresent
GetLocalTime
MapViewOfFile
CreateFileMappingW
CreateFileA
ExitProcess
EnumResourceTypesW
GetUserDefaultLCID
CreateToolhelp32Snapshot
GetOEMCP
SetStdHandle
HeapAlloc
FreeLibrary
AddAtomA
HeapCreate
GetProcAddress
GlobalSize
CreateMailslotW
GetCommandLineA
GetStringTypeW
WriteConsoleOutputCharacterW
WriteProfileStringA
FreeEnvironmentStringsW
GetACP
LoadLibraryA
GetCPInfo
GetStartupInfoA
WriteConsoleW
GetTimeFormatA
LocalShrink
GetModuleHandleA
GetStringTypeA
Sleep
comctl32
DestroyPropertySheetPage
ImageList_GetIconSize
CreatePropertySheetPageW
ImageList_GetIcon
GetEffectiveClientRect
DrawStatusTextA
CreateToolbar
InitCommonControlsEx
ImageList_GetImageRect
ImageList_AddMasked
ImageList_GetFlags
ImageList_SetImageCount
ImageList_DragMove
ImageList_Add
ImageList_LoadImageA
ImageList_Remove
ImageList_SetOverlayImage
_TrackMouseEvent
CreatePropertySheetPage
user32
IsWindowUnicode
ClipCursor
RegisterWindowMessageA
GetInputState
DestroyIcon
SetDlgItemTextW
IsCharLowerA
TrackMouseEvent
LoadCursorFromFileA
SetClassLongW
DdeQueryNextServer
GetScrollBarInfo
EnableScrollBar
RegisterClassA
EnumWindows
ArrangeIconicWindows
EmptyClipboard
GetKeyboardLayoutNameA
LoadCursorW
SwitchDesktop
SetCapture
DdeFreeDataHandle
GetWindow
GetWindowRgn
GetQueueStatus
ValidateRect
DdeQueryStringA
SetScrollRange
CreateIcon
GetClipboardData
DdeCmpStringHandles
GetDC
ShowWindow
SetProcessWindowStation
GetClipboardSequenceNumber
CreateWindowExW
VkKeyScanExW
IsDialogMessageW
CharLowerBuffW
BroadcastSystemMessage
MoveWindow
CopyRect
DlgDirSelectExA
SetParent
PostThreadMessageA
CharNextW
DrawStateW
DestroyWindow
EnumWindowStationsA
SetRectEmpty
GetUpdateRgn
GetThreadDesktop
FindWindowExW
DrawTextExW
CallMsgFilterW
EnumPropsW
SetWindowsHookW
MessageBoxA
SetCursorPos
DestroyAcceleratorTable
GetKeyNameTextW
GetSysColorBrush
RegisterClassExW
GetClassLongA
EnumChildWindows
ShowScrollBar
GetNextDlgTabItem
LoadMenuW
SetWindowPlacement
SetCaretBlinkTime
DrawIcon
GetMenuContextHelpId
RedrawWindow
NotifyWinEvent
GetClassNameW
CharToOemBuffA
GetInputDesktop
VkKeyScanA
GetClassInfoExA
SendMessageA
IsWindowEnabled
DefWindowProcW
SetMenuInfo
GetUserObjectSecurity
GetScrollPos
IsCharUpperA
AppendMenuA
AdjustWindowRect
IntersectRect
SetScrollInfo
RegisterClassExA
GetMenuItemID
SetScrollPos
LookupIconIdFromDirectory
MessageBoxExW
OpenInputDesktop
wininet
CreateUrlCacheContainerW
CreateUrlCacheGroup
InternetReadFileExA
GopherOpenFileA
FtpSetCurrentDirectoryA
HttpOpenRequestW
ResumeSuspendedDownload
DeleteUrlCacheEntry
shell32
SHInvokePrinterCommandA
SHInvokePrinterCommandW
ShellExecuteEx
ShellExecuteA
Sections
.text Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ