Static task
static1
Behavioral task
behavioral1
Sample
8f10af8d74cc7c94fceea6be8dd97e9a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f10af8d74cc7c94fceea6be8dd97e9a.exe
Resource
win10v2004-20231215-en
General
-
Target
8f10af8d74cc7c94fceea6be8dd97e9a
-
Size
180KB
-
MD5
8f10af8d74cc7c94fceea6be8dd97e9a
-
SHA1
c69637da4e00aa26f2fd9246002d426056290088
-
SHA256
dae891fdd187ac3fdd3755c225337766285018db583bf913c13ebfcc1f03e514
-
SHA512
3ee44cac9a27178c52f6efc809dcedeb7a65c15f7f870eb5339aac859be7b5e6ecb2ac4a94b5c2c115f0b77d246653b168920f86606ec352be2097c5b0d2b87c
-
SSDEEP
3072:HFwD7QSkucQr3xl32gO2jKyX9WiDTguiNTiNC2vEZsAfdMOpHKtbiE:7GjGgT5X9WifUTiNd8sAfdMONVE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f10af8d74cc7c94fceea6be8dd97e9a
Files
-
8f10af8d74cc7c94fceea6be8dd97e9a.exe windows:4 windows x86 arch:x86
ef0f09ef0a21b6cb0ab97b065d9b2056
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
wininet
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
shlwapi
PathAppendA
StrStrA
PathFindExtensionA
PathFileExistsA
PathFindFileNameA
SHGetValueA
PathRemoveFileSpecA
kernel32
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
SetFilePointer
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsW
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
GlobalGetAtomNameA
GetThreadLocale
LocalAlloc
GlobalReAlloc
GlobalHandle
LocalReAlloc
lstrcmpA
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStartupInfoA
GetProcessHeap
GetVersionExA
GetCommandLineA
RaiseException
GetSystemTimeAsFileTime
RtlUnwind
GetModuleHandleA
VirtualAlloc
HeapReAlloc
HeapFree
HeapAlloc
GetTempPathA
GetCurrentThread
OpenMutexA
OpenProcess
CopyFileA
WriteFile
GetComputerNameA
CreateFileA
GetFileSize
ReadFile
DeleteFileA
SetLastError
CreateMutexA
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
lstrlenA
CompareStringA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
WaitForSingleObject
TerminateProcess
CloseHandle
FreeLibrary
LoadLibraryA
GetProcAddress
LocalFree
user32
DestroyMenu
PostQuitMessage
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetFocus
ClientToScreen
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
PeekMessageA
ValidateRect
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
LoadIconA
WinHelpA
GetCapture
PostMessageA
FindWindowExA
GetWindowThreadProcessId
EnumWindows
SendMessageTimeoutA
FindWindowA
GetWindowTextA
GetWindow
GetDesktopWindow
MessageBoxA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
RegisterWindowMessageA
gdi32
SetMapMode
GetClipBox
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
SelectObject
CreateBitmap
GetStockObject
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
OffsetViewportOrgEx
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetViewportOrgEx
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ