f:\eakei.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9a3868e03547a025e66114ff93473e8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a3868e03547a025e66114ff93473e8f.exe
Resource
win10v2004-20231222-en
General
-
Target
9a3868e03547a025e66114ff93473e8f
-
Size
548KB
-
MD5
9a3868e03547a025e66114ff93473e8f
-
SHA1
b83c934cc48e7817485e105efb72b746e475a3f9
-
SHA256
1fdb5c63d5b8720f96166eeb1439979c38531ce36fb1cb4928883db7c96e9d61
-
SHA512
7575aa1d0b75c500814a525993b770db7a732d86c7245acd4424659968663f6af9121f5180fccc95b1182ace34256161275e4249c29080b88a1e102325be216f
-
SSDEEP
12288:1DS9HblLCRBcZBid00tpA/lySs6ilA+fZEM:1DSlJLCLAiztO/0SnilA+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a3868e03547a025e66114ff93473e8f
Files
-
9a3868e03547a025e66114ff93473e8f.exe windows:4 windows x86 arch:x86
80613ebc913340f7bc15fe73f7346485
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetMenuStringA
CallMsgFilterA
CreateWindowExA
ExitWindowsEx
GetClientRect
WaitForInputIdle
GetMenuItemCount
MoveWindow
RealChildWindowFromPoint
AdjustWindowRectEx
DefWindowProcA
SendNotifyMessageA
GetWindowPlacement
MapVirtualKeyW
GetCursor
IsDialogMessage
InvalidateRgn
DrawIconEx
DeferWindowPos
ShowWindow
RegisterClassExA
CharLowerBuffA
DestroyWindow
GetClipboardData
IsCharLowerW
ScreenToClient
MessageBoxIndirectA
FindWindowExW
CharUpperBuffW
AdjustWindowRect
ToAsciiEx
RealGetWindowClass
RedrawWindow
SetScrollInfo
EnumDesktopWindows
ExcludeUpdateRgn
DrawTextExW
PostThreadMessageW
SetClassLongA
EnumThreadWindows
SetWindowsHookExW
RegisterClassA
GetClassInfoW
GetNextDlgGroupItem
SubtractRect
MessageBoxW
GetWindowInfo
OemToCharW
MonitorFromRect
DestroyMenu
GetWindowRgn
FindWindowA
GetSysColorBrush
EnumDisplayDevicesA
GetMenuStringW
MapVirtualKeyA
comctl32
MakeDragList
GetEffectiveClientRect
ImageList_DragShowNolock
ImageList_DragLeave
ImageList_ReplaceIcon
ImageList_Duplicate
CreateToolbar
ImageList_SetFlags
CreateUpDownControl
ImageList_SetImageCount
ImageList_GetImageCount
_TrackMouseEvent
CreatePropertySheetPageA
ImageList_Write
ImageList_EndDrag
InitCommonControlsEx
ImageList_LoadImageW
kernel32
GetWindowsDirectoryA
TlsAlloc
TlsFree
HeapReAlloc
EnumResourceTypesA
GetStartupInfoA
VirtualAlloc
TlsGetValue
FreeEnvironmentStringsA
GetCPInfo
QueryPerformanceCounter
InitializeCriticalSection
LCMapStringW
DeleteCriticalSection
SetFilePointer
CreateMutexA
VirtualQuery
CompareStringW
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
InterlockedDecrement
GetCurrentProcessId
GetModuleFileNameA
WriteFile
GetStringTypeW
GetLastError
LoadLibraryA
RtlUnwind
HeapCreate
InterlockedIncrement
GetLocalTime
TerminateProcess
GetTimeZoneInformation
GetTickCount
GetSystemTime
GetEnvironmentStringsW
GetCurrentProcess
MultiByteToWideChar
HeapAlloc
GetCurrentThread
SetLastError
GetCommandLineA
CreateWaitableTimerW
GetEnvironmentStrings
OpenSemaphoreA
InterlockedExchange
GetStringTypeA
ExitProcess
GetVersion
CloseHandle
CompareStringA
SetHandleCount
FlushFileBuffers
UnhandledExceptionFilter
OpenMutexA
SetEnvironmentVariableA
GetOEMCP
HeapDestroy
ResumeThread
GetStdHandle
GetACP
ReadFile
VirtualFree
LCMapStringA
WideCharToMultiByte
EnterCriticalSection
IsBadWritePtr
LeaveCriticalSection
GetCurrentThreadId
TlsSetValue
HeapFree
GetFileType
SetStdHandle
GetProcAddress
GetModuleHandleA
Sections
.text Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ