Static task
static1
Behavioral task
behavioral1
Sample
8e85623459a6ff68f57379afe58097bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e85623459a6ff68f57379afe58097bb.exe
Resource
win10v2004-20231222-en
General
-
Target
8e85623459a6ff68f57379afe58097bb
-
Size
128KB
-
MD5
8e85623459a6ff68f57379afe58097bb
-
SHA1
32681e7a35ad68457162008177da64e1db21313c
-
SHA256
d0b4d46bbe28c5da4ed532750b3fd46dc825b39eacb7f620c3e8f37a0ac05fb8
-
SHA512
4e4ec48a22e91473e5fc9ad1ccfd2116524dd3c8b87b8534bb8895abc319bf17a8c7a3c7f45bc2371a87ca87ed181e9b6e350c4925d53df8fdf63c79d3f43014
-
SSDEEP
3072:H8QOXT7CmOANfxxj0bZW55ofqb9Vj7Oaruxk5z932jzH1F74EK:yX3jOykG0I9V7O8FZAVp4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e85623459a6ff68f57379afe58097bb
Files
-
8e85623459a6ff68f57379afe58097bb.exe windows:4 windows x86 arch:x86
03fd97d19fe0bfbabdf1049185b304df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumWindows
SetTimer
PeekMessageA
PostThreadMessageA
KillTimer
MessageBoxA
CharUpperA
CharNextA
IsWindowVisible
GetMessageA
wsprintfW
GetWindowTextA
LoadStringA
DispatchMessageA
GetWindowThreadProcessId
wsprintfA
advapi32
AddAccessAllowedAce
GetLengthSid
OpenThreadToken
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetThreadToken
AllocateAndInitializeSid
QueryServiceStatus
GetSidSubAuthority
IsValidSid
RegCloseKey
RegQueryValueExA
RegSetKeySecurity
RegQueryValueExW
CloseServiceHandle
ReportEventA
RegConnectRegistryA
InitializeAcl
RegCreateKeyExA
GetSecurityDescriptorControl
RegEnumKeyExA
AddAccessDeniedAce
DeregisterEventSource
GetAce
SetSecurityDescriptorOwner
CopySid
StartServiceCtrlDispatcherA
LookupAccountSidW
RegQueryInfoKeyA
GetSecurityDescriptorDacl
DuplicateToken
LookupAccountNameA
RegSetValueExA
ChangeServiceConfigA
LookupAccountSidA
DuplicateTokenEx
OpenProcessToken
MakeSelfRelativeSD
GetSecurityDescriptorGroup
RegEnumValueA
GetSecurityDescriptorSacl
RegEnumKeyA
SetServiceStatus
GetSidLengthRequired
GetAclInformation
GetSecurityDescriptorLength
RegDeleteKeyA
InitializeSid
RegisterServiceCtrlHandlerA
EqualSid
RegDeleteValueA
MakeAbsoluteSD
GetSecurityDescriptorOwner
CreateServiceA
LookupPrivilegeValueA
GetUserNameA
OpenServiceA
AddAce
RegOpenKeyExA
SetSecurityDescriptorGroup
SetSecurityDescriptorSacl
IsValidSecurityDescriptor
AdjustTokenPrivileges
AccessCheck
PrivilegeCheck
RegCreateKeyA
RegisterEventSourceA
DeleteService
OpenSCManagerA
ControlService
GetTokenInformation
RegOpenKeyExW
ole32
CoRevertToSelf
CoImpersonateClient
CoQueryProxyBlanket
CoTaskMemFree
StringFromGUID2
CoRegisterClassObject
StringFromCLSID
CoInitializeSecurity
CoCreateInstance
CoUninitialize
CoGetClassObject
CoGetCallContext
CoInitializeEx
CoDisconnectObject
StringFromIID
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromString
CoCreateGuid
CoSetProxyBlanket
CoRevokeClassObject
rpcrt4
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
NdrClientCall
RpcStringFreeA
shlwapi
PathFindExtensionA
kernel32
GetCPInfo
WriteProfileStringA
InterlockedDecrement
lstrcpynA
LoadLibraryW
GetThreadLocale
GetComputerNameA
SetLastError
FreeLibrary
GetStdHandle
LocalAlloc
CloseHandle
HeapReAlloc
DuplicateHandle
LoadResource
VirtualFree
CreateEventA
CreateDirectoryA
IsBadCodePtr
SetStdHandle
WideCharToMultiByte
VirtualQuery
FindResourceA
CreateFileA
VirtualAlloc
IsBadReadPtr
CreateThread
lstrlenA
UnmapViewOfFile
CreateFileMappingA
GetLastError
SetEndOfFile
GetEnvironmentStringsW
GetOEMCP
SetHandleCount
SizeofResource
SetUnhandledExceptionFilter
LoadLibraryA
EnterCriticalSection
SetLastError
GetFileAttributesA
TerminateProcess
FlushFileBuffers
ReleaseMutex
ClearCommError
GetFileType
IsDBCSLeadByte
Sleep
GetACP
GetProcAddress
QueryPerformanceCounter
CreateProcessA
InterlockedCompareExchange
FindFirstFileA
GetSystemDirectoryA
GetPrivateProfileStringA
HeapCreate
TlsFree
GetVersionExA
GetStringTypeW
SetErrorMode
GetModuleHandleW
SetEnvironmentVariableA
GetProfileStringA
FindClose
GetStringTypeA
GetCommandLineA
GetTickCount
GetVersion
EnumResourceNamesW
lstrlenW
CreateProcessW
FindResourceExA
LCMapStringW
MapViewOfFile
GetCurrentProcess
FreeEnvironmentStringsA
MultiByteToWideChar
UnhandledExceptionFilter
lstrcatA
GetSystemTimeAsFileTime
RaiseException
TlsSetValue
lstrcpyA
InitializeCriticalSection
GetPrivateProfileSectionNamesA
InterlockedExchange
OpenProcess
GetEnvironmentStrings
TlsGetValue
GetProcessHeap
GetProcessTimes
VirtualProtect
LCMapStringA
ReadFile
ExitProcess
SetFilePointer
SetEvent
CompareStringW
TerminateThread
GetPrivateProfileSectionA
FormatMessageA
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
GetModuleFileNameW
RtlUnwind
HeapSize
GetModuleHandleA
ReadProcessMemory
GetModuleFileNameA
CompareStringA
LeaveCriticalSection
TlsAlloc
HeapAlloc
FreeEnvironmentStringsW
LoadLibraryExA
LockResource
GetCurrentThread
GetLocaleInfoA
LocalFree
CreateMutexA
DeleteCriticalSection
IsBadWritePtr
HeapDestroy
lstrcmpiA
GetPrivateProfileIntA
GetStartupInfoA
WritePrivateProfileStringA
LocalSize
WriteFile
GetSystemInfo
ExitProcess
InterlockedIncrement
GetCurrentThreadId
HeapFree
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rscr Size: 512B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ