Static task
static1
Behavioral task
behavioral1
Sample
8c408b808eee4fdbfbcd4b9ae26728539d183bc525181bc814de9995525507cb.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8c408b808eee4fdbfbcd4b9ae26728539d183bc525181bc814de9995525507cb.exe
Resource
win10v2004-20240412-en
General
-
Target
8c408b808eee4fdbfbcd4b9ae26728539d183bc525181bc814de9995525507cb
-
Size
79KB
-
MD5
4c443463f7f79e6a2bec86d28c7bbb57
-
SHA1
612d4ad75ee080f7090d9c2f95fff77238c441bc
-
SHA256
8c408b808eee4fdbfbcd4b9ae26728539d183bc525181bc814de9995525507cb
-
SHA512
a96fe2d31bf9f49443f55939d01bed5866890b0d9332b00f7c104ca60e7e329a51a726e98ac4671a5b528662bd9df68d743d8832a91bb84922bd171d9fbc82b2
-
SSDEEP
1536:G2ESdUegtLHwzSBu9FFeVmkX5Jb/KJ/lhrXLj:MSd+h3Bu9beVmGwJ/lhrH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c408b808eee4fdbfbcd4b9ae26728539d183bc525181bc814de9995525507cb
Files
-
8c408b808eee4fdbfbcd4b9ae26728539d183bc525181bc814de9995525507cb.exe windows:4 windows x86 arch:x86
345ba2d1a7f8e4ab70935af383aa00e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
IsBadWritePtr
HeapReAlloc
GetPrivateProfileStringA
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
SetFileAttributesA
DeleteFileA
GetFileAttributesA
TerminateProcess
ExitProcess
RaiseException
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
HeapSize
RtlUnwind
GetModuleFileNameA
GetDriveTypeA
GetVersionExA
GetCurrentProcess
MoveFileExA
GetShortPathNameA
GetLastError
WritePrivateProfileStringA
GetTempPathA
SetFileTime
GetWindowsDirectoryA
GetSystemDirectoryA
GetFullPathNameA
GlobalHandle
lstrcatA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
VirtualAlloc
user32
LoadIconA
CreateWindowExA
GetSysColor
GetWindow
SendMessageA
ScreenToClient
GetWindowRect
GetDlgItem
LoadCursorA
RegisterClassA
FindWindowA
GetLastActivePopup
BringWindowToTop
AdjustWindowRectEx
UpdateWindow
ExitWindowsEx
IsIconic
RedrawWindow
PostQuitMessage
DefWindowProcA
ShowWindow
KillTimer
SetTimer
SetFocus
DialogBoxIndirectParamA
EndDialog
EnableWindow
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
RegisterWindowMessageA
OemToCharA
GetDlgItemTextA
PostMessageA
SetWindowTextA
GetParent
GetSystemMetrics
SetWindowPos
GetDC
wsprintfA
SetDlgItemTextA
ReleaseDC
SetWindowLongA
GetClientRect
BeginPaint
FillRect
EndPaint
gdi32
CreateDIBPatternBrush
SelectObject
SetBkMode
SetTextColor
TextOutA
IntersectClipRect
DeleteDC
RealizePalette
StretchDIBits
GetDeviceCaps
GetSystemPaletteEntries
CreatePalette
SetBkColor
ExtTextOutA
GetObjectA
CreateFontIndirectA
DeleteObject
GetStockObject
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
SelectPalette
CreateSolidBrush
comdlg32
GetSaveFileNameA
advapi32
RegOpenKeyExA
RegQueryValueA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
OpenProcessToken
shell32
ShellExecuteA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ