Static task
static1
Behavioral task
behavioral1
Sample
8fde5faceca028fd4221c57a9f0d41eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fde5faceca028fd4221c57a9f0d41eb.exe
Resource
win10v2004-20231222-en
General
-
Target
8fde5faceca028fd4221c57a9f0d41eb
-
Size
167KB
-
MD5
8fde5faceca028fd4221c57a9f0d41eb
-
SHA1
de5b462e4ded93660138fc5d73b9bc05e6a23201
-
SHA256
f00d4b749a68c29964ec50e7c908e3c97b89c4ba33ef0a93f9fc265ff5301756
-
SHA512
db1c41924c90375829f0204858fb42eb4930102057044f1ba759aafe246335184affdac0b6310c72737ca5321025bf55d0bd60ebe694b6f88b449dbe3aaa771d
-
SSDEEP
3072:Q9qNjVVJKuwwZ0fNm5o+JHVsG/NX+0APipCLS0TtnM:JjV2uU8SSmG/NO0MuQtM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8fde5faceca028fd4221c57a9f0d41eb
Files
-
8fde5faceca028fd4221c57a9f0d41eb.exe windows:4 windows x86 arch:x86
568f85bd1fb09a3b28c8532d63ffb86c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBitmapBits
BitBlt
CreateDIBSection
SaveDC
LineTo
CreateBrushIndirect
CreateCompatibleBitmap
CreateBitmap
CreatePalette
kernel32
GetDateFormatA
GetModuleHandleA
LoadLibraryA
GetStartupInfoA
VirtualAlloc
GetProcAddress
GetVersionExA
ExitProcess
HeapAlloc
HeapDestroy
MulDiv
GetCPInfo
GetProcessHeap
LocalAlloc
version
GetFileVersionInfoA
advapi32
RegQueryValueExA
RegLoadKeyA
RegOpenKeyA
shell32
SHFileOperationA
DragQueryFileA
SHGetSpecialFolderLocation
user32
CheckMenuItem
DrawAnimatedRects
DrawFrameControl
CharLowerBuffA
EnumWindows
GetFocus
GetClipboardData
GetActiveWindow
RegisterWindowMessageA
GetSystemMetrics
FillRect
KillTimer
InvalidateRect
FrameRect
InsertMenuA
BeginPaint
IsWindowUnicode
TrackPopupMenu
GetTopWindow
MessageBoxA
GetScrollInfo
WindowFromPoint
ChildWindowFromPoint
GetClassNameA
SetWindowTextA
IsZoomed
CreatePopupMenu
GetKeyboardLayoutList
SetWindowsHookExA
IsRectEmpty
PostQuitMessage
EnumChildWindows
ScrollWindow
CharUpperBuffA
CallNextHookEx
GetCursor
TranslateMessage
GetDlgItem
MoveWindow
EqualRect
SetCursor
MessageBeep
GetKeyNameTextA
GetForegroundWindow
wsprintfA
EnableScrollBar
SetClipboardData
SetForegroundWindow
GetWindowThreadProcessId
MsgWaitForMultipleObjects
UnhookWindowsHookEx
DestroyCursor
CharNextW
CallWindowProcA
PostMessageA
CreateMenu
GetSystemMenu
DispatchMessageA
LoadStringA
OpenClipboard
GetCursorPos
SetWindowPlacement
InsertMenuItemA
DefWindowProcA
RegisterClipboardFormatA
GetCapture
InflateRect
SendMessageW
GetMenuItemID
SetClassLongA
DefFrameProcA
SetPropA
GetKeyboardLayout
IsDialogMessageA
RegisterClassA
SetMenu
LoadKeyboardLayoutA
SendMessageA
PtInRect
DrawMenuBar
GetMenuState
SystemParametersInfoA
GetLastActivePopup
RedrawWindow
DeleteMenu
GetWindowLongA
UnregisterClassA
GetKeyboardType
CloseClipboard
ShowWindow
GetScrollPos
GetPropA
MapWindowPoints
WaitMessage
ClientToScreen
SetScrollInfo
RemoveMenu
ReleaseCapture
FindWindowA
SetWindowLongA
EnumThreadWindows
ScreenToClient
GetSysColorBrush
ShowScrollBar
OffsetRect
GetSysColor
IsWindow
DrawIcon
GetScrollRange
GetWindowLongW
SetWindowPos
SetActiveWindow
GetClassLongA
SetScrollRange
PeekMessageW
GetKeyboardLayoutNameA
SetFocus
oleaut32
GetErrorInfo
SysFreeString
RegisterTypeLib
SafeArrayPtrOfIndex
VariantCopyInd
SysAllocStringLen
SysStringLen
OleLoadPicture
shlwapi
SHStrDupA
PathGetCharTypeA
SHDeleteValueA
SHQueryInfoKeyA
SHGetValueA
SHDeleteKeyA
PathIsContentTypeA
PathIsDirectoryA
SHEnumValueA
comctl32
ImageList_DrawEx
ImageList_GetBkColor
ImageList_Read
ImageList_Write
ImageList_Destroy
msvcrt
log10
memmove
memcmp
ole32
OleRun
PropVariantClear
comdlg32
GetFileTitleA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ