d:\edh\hoghpw\asit.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b8b1d1a08f2e105b6c9941e7ecc561f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8b1d1a08f2e105b6c9941e7ecc561f7.exe
Resource
win10v2004-20240226-en
General
-
Target
b8b1d1a08f2e105b6c9941e7ecc561f7
-
Size
736KB
-
MD5
b8b1d1a08f2e105b6c9941e7ecc561f7
-
SHA1
0bcf443f4ddd0a29d65fc0ba90811203c8e8d51e
-
SHA256
6741e2fd58522619df05c1e81a4155db03441430bc71701404d9e16dc24b014c
-
SHA512
80012d9d9fcf8b4362e06b9ecca2deec49b939a3d157808998eca82c213b24dd7aaf184f2818468b1ca7e910daee39d59af4afe7e19bb4d69a31bc48993ee3ac
-
SSDEEP
12288:RPvggaBCXhxohVUAqWF8r2ezGZc1ZM9fFcYfaefcJPKjC7lj8/L3pd8uSTczmd:CDBmf6EhzGK1cesaicdEC7sguSTc+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8b1d1a08f2e105b6c9941e7ecc561f7
Files
-
b8b1d1a08f2e105b6c9941e7ecc561f7.exe windows:4 windows x86 arch:x86
441ef4fe9ad30e59a58ef031518212fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shell32
DragFinish
SHBrowseForFolderA
DragQueryFileA
SHFileOperationA
ord155
SHGetPathFromIDListA
ExtractIconA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetDesktopFolder
ole32
CoGetClassObject
ReleaseStgMedium
OleRun
OleFlushClipboard
CreateGenericComposite
CreateStreamOnHGlobal
CoCreateInstance
CreateILockBytesOnHGlobal
CoInitializeEx
OleGetClipboard
DoDragDrop
CoRegisterClassObject
GetRunningObjectTable
RevokeDragDrop
CoInitialize
CoRevokeClassObject
WriteClassStm
StgOpenStorageOnILockBytes
CoUninitialize
CreateBindCtx
CLSIDFromProgID
CoFreeUnusedLibraries
OleInitialize
OleIsCurrentClipboard
CoTaskMemAlloc
RegisterDragDrop
CLSIDFromString
CreateFileMoniker
OleUninitialize
StgCreateDocfileOnILockBytes
CreateItemMoniker
CoLockObjectExternal
GetHGlobalFromILockBytes
CoTaskMemFree
CoRegisterMessageFilter
OleRegGetUserType
OleDuplicateData
OleLockRunning
OleLoad
wsock32
WSACleanup
advapi32
InitializeSecurityDescriptor
RegQueryValueExA
RegSetValueExA
OpenProcessToken
RegSetValueExW
GetSidSubAuthorityCount
RegSetKeySecurity
RegCreateKeyExW
kernel32
ReadFile
GetModuleHandleW
GetVersion
HeapAlloc
GetCommandLineW
TlsSetValue
CloseHandle
GetStringTypeW
HeapCreate
FlushFileBuffers
GetModuleFileNameA
GetTickCount
SetEnvironmentVariableA
TerminateProcess
GetStringTypeA
LoadLibraryA
VirtualAlloc
TlsAlloc
CompareStringW
GetCurrentThreadId
GetModuleHandleA
DeleteCriticalSection
GetSystemTimeAsFileTime
CreateMutexW
SetLastError
SetStdHandle
GetStartupInfoW
HeapFree
GetStartupInfoA
QueryPerformanceCounter
VirtualQuery
FatalAppExitA
SetFilePointer
LCMapStringA
FreeEnvironmentStringsW
GetStdHandle
GetCurrentThread
EnterCriticalSection
FreeEnvironmentStringsA
GetCPInfo
ExitProcess
GetProcAddress
GetCurrentProcessId
GetEnvironmentStringsW
VirtualFree
GetCurrentProcess
HeapReAlloc
CompareStringA
IsBadWritePtr
LeaveCriticalSection
SetHandleCount
WriteFile
InterlockedExchange
MultiByteToWideChar
GetCommandLineA
GetTimeZoneInformation
GetFileType
GetLastError
GetModuleFileNameW
IsBadCodePtr
SetConsoleCtrlHandler
TlsFree
SetUnhandledExceptionFilter
GetSystemTime
RtlUnwind
LCMapStringW
RaiseException
TlsGetValue
InterlockedIncrement
IsBadReadPtr
InitializeCriticalSection
HeapDestroy
GetLocalTime
UnhandledExceptionFilter
WideCharToMultiByte
InterlockedDecrement
GetEnvironmentStrings
version
VerQueryValueA
GetFileVersionInfoSizeA
user32
SetPropW
GetLastActivePopup
EnableWindow
RegisterClassW
EmptyClipboard
TranslateMessage
IsDialogMessageW
GetDC
GetMenu
GetMenuItemID
IsZoomed
ReleaseDC
IsChild
DefWindowProcW
SetMenuItemBitmaps
GetFocus
SendDlgItemMessageA
EnumChildWindows
ShowWindow
RemovePropW
SetWindowPos
BeginPaint
OpenClipboard
ModifyMenuW
SetCursorPos
SetWindowsHookExW
GetDesktopWindow
ShowOwnedPopups
GetMenuStringW
CallWindowProcW
BringWindowToTop
UpdateWindow
WinHelpW
LoadImageW
BeginDeferWindowPos
GetMenuItemInfoW
SetCursor
GetSysColor
GetClassNameW
SetWindowLongW
GetIconInfo
GetMenuCheckMarkDimensions
ValidateRect
GetWindowRgn
SetMenuDefaultItem
SendMessageW
CreateWindowExW
DrawIconEx
AdjustWindowRectEx
TabbedTextOutW
TrackPopupMenu
GetSystemMetrics
ReuseDDElParam
SetTimer
SystemParametersInfoA
DefMDIChildProcW
LoadMenuW
AppendMenuW
GetClassInfoW
RegisterClassExW
UnregisterClassW
InsertMenuItemW
DestroyWindow
GetWindowThreadProcessId
GetMonitorInfoW
RedrawWindow
DrawEdge
GetDlgItem
GetCapture
CharUpperW
InvalidateRect
SetWindowPlacement
SetActiveWindow
MonitorFromWindow
LockWindowUpdate
UnhookWindowsHookEx
DrawFocusRect
SetForegroundWindow
GetCursorPos
GetMenuDefaultItem
SetMenu
SetClipboardData
LoadBitmapW
GetWindowPlacement
IsWindow
LoadIconW
IntersectRect
TranslateAcceleratorW
TrackMouseEvent
WaitMessage
ReleaseCapture
WindowFromPoint
MessageBoxW
GetMessageTime
PostThreadMessageW
GetAncestor
DeferWindowPos
GetActiveWindow
ScreenToClient
SubtractRect
GetMenuState
GetParent
GetScrollInfo
CopyImage
DestroyAcceleratorTable
KillTimer
NotifyWinEvent
TranslateMDISysAccel
SetFocus
SystemParametersInfoW
DrawFrameControl
LoadCursorW
GetWindowTextLengthW
EndDeferWindowPos
CallNextHookEx
GetNextDlgTabItem
MessageBeep
FrameRect
RegisterWindowMessageW
LoadAcceleratorsW
SetScrollPos
CloseClipboard
ShowScrollBar
DrawTextW
EnableScrollBar
DrawTextExW
PostMessageW
GetScrollBarInfo
CreateDialogIndirectParamW
GetMessageW
GetScrollPos
GetClientRect
GetTopWindow
SendDlgItemMessageW
GetWindowTextW
GetMessagePos
GetWindow
GetNextDlgGroupItem
UnpackDDElParam
GetSystemMenu
DestroyIcon
InflateRect
IsMenu
DispatchMessageW
PtInRect
OffsetRect
SetRect
GetKeyState
GrayStringW
GetMenuItemCount
GetSysColorBrush
GetDCEx
GetSubMenu
SetScrollInfo
RegisterClipboardFormatW
EndDialog
SetRectEmpty
GetWindowRect
PeekMessageW
IsClipboardFormatAvailable
EnableMenuItem
CopyIcon
GetWindowLongW
SetClassLongW
InsertMenuW
GetWindowDC
DrawMenuBar
FillRect
SetWindowTextW
IsWindowVisible
SetMenuItemInfoW
DefFrameProcW
GetClassLongW
GetPropW
CreatePopupMenu
GetClassInfoExW
EqualRect
PostQuitMessage
DrawStateW
EndPaint
SetWindowRgn
UnionRect
GetUpdateRect
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 456KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ