Static task
static1
Behavioral task
behavioral1
Sample
b8c1fa7b9f8818580e6531103672dade.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8c1fa7b9f8818580e6531103672dade.exe
Resource
win10v2004-20240226-en
General
-
Target
b8c1fa7b9f8818580e6531103672dade
-
Size
152KB
-
MD5
b8c1fa7b9f8818580e6531103672dade
-
SHA1
83e19142d500dca959dfd159c33ee857df953fe5
-
SHA256
d59673c999f3f442f8e3408400e963f96c0ff441b9478e90a86026de41a9e487
-
SHA512
b3b05f1cdc44c84416a122bbde77c1de5b4e3d41a71d3883c10fcf851edd3a33c755ec9f648930ee953192f1581f4c55f3e1127ccdd404596f0529b8316e7369
-
SSDEEP
3072:UpNlV8gSvbLlf+U704ChxTQqh7/28guGE0ocENjMdr:UpNlVIlGd4CFh7/28gUQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8c1fa7b9f8818580e6531103672dade
Files
-
b8c1fa7b9f8818580e6531103672dade.exe windows:4 windows x86 arch:x86
ef2defb3ea2069d9d308c2cb9163e13b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
GetProcessVersion
DuplicateHandle
ReadFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetVolumeInformationA
GetFullPathNameA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
SetStdHandle
GetFileType
RaiseException
HeapReAlloc
GlobalFlags
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrcpynA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
MulDiv
LoadLibraryA
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
FindNextFileA
lstrcpyA
FindFirstFileA
SetLastError
FindClose
LocalFree
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalLock
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
ReadProcessMemory
WideCharToMultiByte
GetShortPathNameA
GetPrivateProfileStringA
Sleep
WinExec
CreateMutexA
GetLastError
FindResourceA
LoadResource
GlobalAlloc
LockResource
GlobalFree
CreateFileA
WriteFile
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
SetFileAttributesA
DeleteFileA
CopyFileA
GetCurrentDirectoryA
GetModuleFileNameA
GetSystemDirectoryA
GetFileAttributesA
GetCurrentProcess
OpenProcess
lstrlenA
CloseHandle
GetModuleHandleA
HeapSize
FreeLibrary
user32
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ShowWindow
ClientToScreen
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
CharUpperA
DestroyMenu
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
EnableWindow
PostMessageA
FindWindowA
GetWindowThreadProcessId
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
SetTimer
LoadIconA
GetWindowLongA
SetWindowLongA
MoveWindow
DestroyWindow
UnregisterClassA
gdi32
ScaleWindowExtEx
DeleteObject
SetWindowExtEx
SelectObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
RestoreDC
SaveDC
DeleteDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExA
comctl32
ord17
urlmon
URLDownloadToFileA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ