Static task
static1
Behavioral task
behavioral1
Sample
8f5a2f2a8c8cbbaf775337989c18e30e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8f5a2f2a8c8cbbaf775337989c18e30e.exe
Resource
win10v2004-20231222-en
General
-
Target
8f5a2f2a8c8cbbaf775337989c18e30e
-
Size
136KB
-
MD5
8f5a2f2a8c8cbbaf775337989c18e30e
-
SHA1
717363cf3d5f20fd0a512757515f13eadb9b8073
-
SHA256
3d189ddd51ca3eb38d50a6c3efb843eef96d08ee921860aa6bf79280651c3174
-
SHA512
878015d0934de0336e7f070a13db4f91b42cb294d50d3ac32b33ed362f8431cf8c01e4accbd214d093042b57a4c2b05c388d5fa9b4a4e07835045f4429396f34
-
SSDEEP
1536:rQXsKgBoJyxH9H+8NnCViQIv7FkjR3mU0aCz9lJrqWFDF1CVi5t1pfhCL2lp+YYF:SeiJyldOivJS5RklnF1giwL2/k8shA4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f5a2f2a8c8cbbaf775337989c18e30e
Files
-
8f5a2f2a8c8cbbaf775337989c18e30e.exe windows:4 windows x86 arch:x86
8bea4bc6b8c217e419264585f96bc085
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetWindowExtEx
LineTo
SaveDC
CreateRectRgn
DeleteDC
PatBlt
CreatePen
UnrealizeObject
GetTextMetricsA
GetDCOrgEx
DeleteObject
SelectClipPath
IntersectClipRect
GetCharWidth32A
PlayEnhMetaFile
GetBrushOrgEx
SetBkColor
GetPixel
RestoreDC
RectVisible
SetROP2
EndPage
ExcludeClipRect
StretchBlt
CreatePatternBrush
GetDeviceCaps
MaskBlt
CreateCompatibleBitmap
SetStretchBltMode
GetClipBox
GetDIBColorTable
BeginPath
GetEnhMetaFilePaletteEntries
OffsetViewportOrgEx
Rectangle
PtVisible
Chord
SetTextColor
EndPath
MoveToEx
SelectObject
SetColorSpace
LPtoDP
CreateBitmap
SetBrushOrgEx
GetPaletteEntries
SetViewportOrgEx
BitBlt
SetBkMode
SetDIBColorTable
kernel32
GetConsoleOutputCP
GetCurrentThreadId
GetTickCount
SetLastError
GetCurrentThread
GetModuleHandleW
lstrlenW
GetVersion
DeleteFileA
GetUserDefaultLangID
GlobalFindAtomW
GetThreadLocale
GetOEMCP
GlobalFindAtomA
MulDiv
CopyFileA
GetModuleHandleA
GetCommandLineW
RemoveDirectoryA
GetProcessHeap
DeleteFileW
lstrlenA
GetCurrentProcessId
lstrcmpiA
IsDebuggerPresent
GetLastError
SetCurrentDirectoryA
GetCommandLineA
GetACP
lstrcmpA
GetCurrentProcess
lstrcmpiW
VirtualAlloc
user32
CharNextA
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE