c:\aee.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8d6297175664689dc97b118c44ace8f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d6297175664689dc97b118c44ace8f4.exe
Resource
win10v2004-20231215-en
General
-
Target
8d6297175664689dc97b118c44ace8f4
-
Size
564KB
-
MD5
8d6297175664689dc97b118c44ace8f4
-
SHA1
d81c27550f1034eac6fb61f06f09c554d1a3ec6b
-
SHA256
07eaaa22c91450d434e56e44bc1babe4bce158aba1dd2df864f783276ff6cca9
-
SHA512
d8484f53d18230a9332b43a1ca89fe4989e3eff0d7a5acfa167326ac769ac51edf870fef31e58ea9b824a67467598896bbf188d9536d0454d14ddef091ffe0cb
-
SSDEEP
12288:3HpeU7xoTlHs+1NPZBAcO8PXzdSgQ1tDvFCB:336T1tWcOuXzd/QvDvF+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d6297175664689dc97b118c44ace8f4
Files
-
8d6297175664689dc97b118c44ace8f4.exe windows:4 windows x86 arch:x86
51ffca833d5d8f5ed5a670de1df13726
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
CreatePropertySheetPageW
ImageList_AddMasked
CreatePropertySheetPageA
CreateStatusWindow
ImageList_GetImageRect
ImageList_AddIcon
ImageList_Write
ImageList_LoadImageW
ImageList_SetBkColor
InitCommonControlsEx
ImageList_Read
ImageList_SetFlags
user32
EnumPropsExW
GetMessageTime
DestroyWindow
InvertRect
ShowWindowAsync
TranslateAcceleratorW
LoadMenuIndirectW
DdeAbandonTransaction
GetClassWord
SetClassWord
GetClipboardViewer
SetWindowTextW
WaitMessage
SystemParametersInfoW
SetTimer
DefDlgProcA
EndTask
TrackPopupMenu
InternalGetWindowText
SetClassLongW
LoadBitmapA
BroadcastSystemMessageW
RegisterClassExA
SetMessageQueue
CharNextW
ScrollWindowEx
GetClipboardData
KillTimer
DeleteMenu
GetMenuDefaultItem
SetWindowPos
WindowFromPoint
RegisterClassA
DrawStateA
DefFrameProcA
GetFocus
InflateRect
PostMessageW
gdi32
EnumObjects
kernel32
VirtualQuery
VirtualFreeEx
GetStringTypeA
LoadLibraryA
LeaveCriticalSection
ReadFile
TerminateProcess
GetLocalTime
GetVersion
GetProcAddress
CompareStringW
GetModuleFileNameA
CreateDirectoryW
VirtualFree
HeapFree
GetCommandLineW
EnterCriticalSection
SetEnvironmentVariableA
GetStartupInfoA
FoldStringA
GetStartupInfoW
InterlockedDecrement
SetStdHandle
RtlUnwind
GetModuleHandleA
DeleteCriticalSection
WriteProfileStringW
CreateSemaphoreW
TlsSetValue
InterlockedExchange
LCMapStringW
GetCurrentProcessId
HeapDestroy
GetEnvironmentStringsW
SetLastError
GetStdHandle
InitializeCriticalSection
InterlockedIncrement
HeapReAlloc
TlsFree
CreateMutexA
TlsAlloc
GetModuleFileNameW
CreateWaitableTimerA
SetThreadLocale
GetTimeZoneInformation
FlushFileBuffers
GetLastError
CompareStringA
LCMapStringA
SetConsoleTextAttribute
GetProfileStringA
SetFilePointer
FreeEnvironmentStringsW
UnhandledExceptionFilter
IsBadWritePtr
ExitProcess
HeapCreate
GetTickCount
VirtualAlloc
CloseHandle
GetCommandLineA
EnumDateFormatsW
WriteFile
GetSystemTimeAdjustment
GetSystemTimeAsFileTime
GetCurrentThreadId
SetHandleCount
GetCurrentThread
GetStringTypeW
WideCharToMultiByte
WriteProfileSectionA
TlsGetValue
MultiByteToWideChar
GetCurrentProcess
GetCPInfo
GetSystemTime
HeapAlloc
FreeEnvironmentStringsA
GetFileType
QueryPerformanceCounter
GetEnvironmentStrings
OpenMutexA
Sections
.text Size: 164KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ