E:\Datahelp\UPLO\HTTP\HTTP_T\17_05_2011\Release\Http_t.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8fedbdf88643f867d8e9d450c76d20ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fedbdf88643f867d8e9d450c76d20ff.exe
Resource
win10v2004-20231215-en
General
-
Target
8fedbdf88643f867d8e9d450c76d20ff
-
Size
295KB
-
MD5
8fedbdf88643f867d8e9d450c76d20ff
-
SHA1
128cef8eae49c8c20d14789562f04eb641822afd
-
SHA256
ede703fa325ef6047dbbd3bc19378dd0a45c2893a6093ce984c962534e144be6
-
SHA512
afe87a785c3336add2c4562118143ae6801841cc9285cae020958d35f3e432faa9d29d23595a271001f7e0799929c2d9436b079dce80d5df60656059ca867955
-
SSDEEP
6144:eF2y1AOwet3Pk2cdq0Q/1ypXuKcH5g/yG/9l:yF1AwkJ6sp+K+5g/y+l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8fedbdf88643f867d8e9d450c76d20ff
Files
-
8fedbdf88643f867d8e9d450c76d20ff.exe windows:5 windows x86 arch:x86
a4f899ff94d392dbd648db857ce870ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalFree
SetLastError
DeleteFileA
LoadLibraryA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetVolumeInformationA
GetProcAddress
FileTimeToLocalFileTime
FreeLibrary
LocalAlloc
CompareStringA
GetModuleHandleW
InterlockedIncrement
InterlockedDecrement
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalGetAtomNameA
lstrcmpA
GetFileAttributesA
GetFileSizeEx
GetFileTime
GlobalAddAtomA
GlobalFlags
GetCurrentThreadId
GetVersionExA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
InterlockedExchange
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
HeapFree
SetCurrentDirectoryA
HeapAlloc
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
VirtualAlloc
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
ExitProcess
HeapCreate
VirtualFree
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetACP
IsValidCodePage
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
GetProcessHeap
lstrlenA
GetModuleHandleA
CreateMutexA
OpenMutexA
GetExitCodeProcess
WaitForSingleObject
GetLastError
CreateProcessA
CreateThread
CloseHandle
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateFileA
MoveFileExA
GetPrivateProfileStringA
GetComputerNameA
GetModuleFileNameA
FileTimeToSystemTime
FindClose
FindNextFileA
FindFirstFileA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFullPathNameA
Sleep
user32
SetMenu
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
CallWindowProcA
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowLongA
IsWindow
GetDlgItem
SetWindowsHookExA
CallNextHookEx
GetKeyState
PeekMessageA
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
CharUpperA
GetSystemMetrics
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
FindWindowA
SendMessageA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassExA
CreateWindowExA
UpdateWindow
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
SetForegroundWindow
GetClientRect
PostMessageA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
SetWindowPos
CopyRect
ValidateRect
advapi32
CryptEncrypt
CryptReleaseContext
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptDestroyHash
CryptAcquireContextA
CryptDecrypt
shlwapi
PathFindFileNameA
PathIsUNCA
PathStripToRootA
PathFileExistsA
PathRemoveFileSpecA
wininet
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
HttpSendRequestExA
HttpEndRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetCloseHandle
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
OffsetViewportOrgEx
DeleteObject
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
GetStockObject
CreateBitmap
PtVisible
RectVisible
TextOutA
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetDeviceCaps
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ