Static task
static1
Behavioral task
behavioral1
Sample
8fbbcc4a3e251e2009fca804fbe15fb6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fbbcc4a3e251e2009fca804fbe15fb6.exe
Resource
win10v2004-20231222-en
General
-
Target
8fbbcc4a3e251e2009fca804fbe15fb6
-
Size
134KB
-
MD5
8fbbcc4a3e251e2009fca804fbe15fb6
-
SHA1
b6a488d0e349393ee2097e3c27ef2fc84e87b038
-
SHA256
db2c0a8738fe8e0cf38df96adaa3e493e4dd9af74325acd233239d3d9b055382
-
SHA512
78821de9a4875239cc741d52d4883f3d5e4dcdd498e50415744e8eddab6214e80c575cc25ac8cd550298af62b6427d8275d06d90a5ee6ca502bd6dc5c582e017
-
SSDEEP
3072:b3IQeMnBGau23lidOz9nD8NyRi+nG2LNjFPYN:b3QmBGklqe9DdiQfLNjFQN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8fbbcc4a3e251e2009fca804fbe15fb6
Files
-
8fbbcc4a3e251e2009fca804fbe15fb6.exe windows:4 windows x86 arch:x86
61b10dda775635db60107659217e05e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputA
VirtualAlloc
LoadModule
GetCurrentThread
SetCommMask
UnlockFile
GetComputerNameA
GetStringTypeExW
GetNamedPipeHandleStateA
SuspendThread
SetThreadLocale
GetStartupInfoW
GetConsoleCommandHistoryA
GlobalDeleteAtom
BuildCommDCBW
VirtualFreeEx
GetSystemDirectoryW
WriteProfileStringA
FoldStringW
GetCurrentDirectoryA
WriteConsoleInputA
GetFileAttributesW
TlsSetValue
SetConsoleDisplayMode
GetCurrentDirectoryA
GetCurrentThreadId
GetCompressedFileSizeA
user32
MBToWCSEx
SetSystemCursor
ScrollWindow
EqualRect
LoadImageA
IsCharLowerW
DragObject
CountClipboardFormats
GetInternalWindowPos
DrawTextW
DdeGetLastError
SetDeskWallpaper
OemToCharA
MessageBoxExA
SetCaretBlinkTime
GetMessageTime
SetProgmanWindow
GetWindowTextLengthW
OpenWindowStationW
DeleteMenu
MessageBoxIndirectW
SetShellWindow
WindowFromDC
GetMenuStringA
GetClassNameA
UnregisterClassW
IsRectEmpty
SetRect
GetCaretBlinkTime
AppendMenuA
TrackMouseEvent
PrivateExtractIconsW
RegisterShellHookWindow
DefMDIChildProcA
BringWindowToTop
gdi32
ExcludeClipRect
GetCharacterPlacementA
EnumFontFamiliesExW
GetWinMetaFileBits
CreateDCA
GetTextMetricsA
PtVisible
SetBitmapDimensionEx
FixBrushOrgEx
GetPolyFillMode
SetViewportOrgEx
UnrealizeObject
EnumEnhMetaFile
TextOutW
GdiFixUpHandle
SelectClipPath
LineTo
GetGraphicsMode
EnumICMProfilesW
SelectPalette
RectVisible
SetFontEnumeration
MaskBlt
GdiDllInitialize
GdiPlayJournal
GetCharWidthInfo
GetSystemPaletteUse
GetCurrentObject
GdiCreateLocalEnhMetaFile
cGetTTFFromFOT
DeleteEnhMetaFile
DeleteObject
ResetDCA
SetROP2
ResizePalette
ole32
HBITMAP_UserMarshal
CreateBindCtx
OleCreateLinkFromData
HMETAFILEPICT_UserSize
CoMarshalInterThreadInterfaceInStream
CoIsHandlerConnected
HBRUSH_UserUnmarshal
CoGetInstanceFromIStorage
CoCreateInstanceEx
CoLockObjectExternal
OleCreateLink
CoUninitialize
OleDuplicateData
HGLOBAL_UserSize
OleCreateLinkToFileEx
Sections
.text Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 85KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ