?DllGetVersion@@YAHPAU_DllVersionInfo@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
b8793a902d466a961ee8cc8477c23c7f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8793a902d466a961ee8cc8477c23c7f.exe
Resource
win10v2004-20240226-en
General
-
Target
b8793a902d466a961ee8cc8477c23c7f
-
Size
366KB
-
MD5
b8793a902d466a961ee8cc8477c23c7f
-
SHA1
d6cd6c33c2746994b40ca1956d3f8a6750ac7405
-
SHA256
786e74150f4a3b1c136a141d894960cd0065be2d2613fe79fa00224ca84a5d0d
-
SHA512
67d94229ed34d3a4b06c58019e97001b61ecb79ee3ea7557dbb7eaf8788aaf3bc0a5feb95035cff9679414f1411f4e5bfc7fb5e78e0aab6b44512bd32b543c19
-
SSDEEP
6144:P0AmrMyLXYbTZu80xK08dpVv0HgeYw/ZadbvJSwUbwZ:P0AmrDsnZu8W0pt0HHBivJeQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8793a902d466a961ee8cc8477c23c7f
Files
-
b8793a902d466a961ee8cc8477c23c7f.exe windows:4 windows x86 arch:x86
3b6a28f1bf456069d23783cf91414b33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
connect
WSAStartup
WSAGetLastError
htons
WSACleanup
recv
socket
gethostbyname
send
kernel32
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FindResourceA
GetLocaleInfoA
LoadResource
GlobalLock
WaitForSingleObject
GetCommandLineA
FindResourceExA
GlobalAlloc
WideCharToMultiByte
SizeofResource
CreateProcessA
GetModuleFileNameW
CompareStringW
GetACP
MultiByteToWideChar
InterlockedExchange
GetThreadLocale
LockResource
CompareStringA
GetLastError
CloseHandle
GlobalReAlloc
CreateThread
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
CreateFileA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
SetStdHandle
FlushFileBuffers
VirtualQuery
GetSystemInfo
VirtualProtect
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
Sleep
InitializeCriticalSection
FormatMessageA
RtlUnwind
RaiseException
LoadLibraryA
SetEndOfFile
GetProcessHeap
GetVersionExA
WriteFile
GetCurrentDirectoryA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
HeapFree
HeapAlloc
HeapSize
DeleteFileA
CreateDirectoryA
RemoveDirectoryA
GetFullPathNameA
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
TlsSetValue
TlsGetValue
ResumeThread
GetTimeFormatA
GetDateFormatA
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
TlsFree
SetLastError
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetTimeZoneInformation
ReadFile
GetDriveTypeA
user32
DestroyWindow
GetMessageA
CreateDialogParamA
DdeCreateStringHandleA
DdeGetLastError
DdeInitializeA
GetClientRect
GetDC
TranslateMessage
GetWindowTextA
MessageBoxA
PeekMessageA
ReleaseDC
GetDlgItem
SetWindowPos
ShowWindow
DispatchMessageA
DdeClientTransaction
DdeConnect
DdeNameService
SetWindowTextA
GetCursorPos
gdi32
DeleteObject
SelectObject
GetBkColor
CreatePen
CreateSolidBrush
Polygon
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteExA
Exports
Exports
Sections
.text Size: 144KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ