Static task
static1
Behavioral task
behavioral1
Sample
08ceebe8fe8d2277240482f1d815b63ab60b8693693b20716cdd328307c7caf7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
08ceebe8fe8d2277240482f1d815b63ab60b8693693b20716cdd328307c7caf7.exe
Resource
win10v2004-20240226-en
General
-
Target
08ceebe8fe8d2277240482f1d815b63ab60b8693693b20716cdd328307c7caf7
-
Size
377KB
-
MD5
081d86b1a5a8f19733988bbf58b37ee9
-
SHA1
e15e803344b2126ec542651ba46f2755e320ce33
-
SHA256
08ceebe8fe8d2277240482f1d815b63ab60b8693693b20716cdd328307c7caf7
-
SHA512
dbdacc6e46bd4fd42b3003ee49a367697b388ff65e29aa876e39946643e71fd30f5cae21d78585a3e154a47c8f493ef0de67ba8ea134faf4ce3318ffb4c384af
-
SSDEEP
6144:gi4TBXZh3Am19Lk/8LS35qQkOLwfFGIMcPayeMlTDIeuhDF2uVBUJ6Ezubg66:gisBXZh3Amr4/8YN9Lw4izIeuhDF2uVa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08ceebe8fe8d2277240482f1d815b63ab60b8693693b20716cdd328307c7caf7
Files
-
08ceebe8fe8d2277240482f1d815b63ab60b8693693b20716cdd328307c7caf7.exe windows:5 windows x86 arch:x86
8765057780dde950993dc56a99702829
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreatePipe
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
VirtualAlloc
HeapCreate
LoadLibraryA
GetProcAddress
HeapAlloc
ExitThread
LocalFree
lstrlenW
GetTempPathW
LoadLibraryW
GetCurrentProcess
QueryDosDeviceW
GetFullPathNameW
GetLongPathNameW
GetModuleFileNameW
GetEnvironmentVariableW
GetCurrentProcessId
MoveFileExW
ExpandEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetFileAttributesW
GetVersion
CreateSemaphoreW
ReleaseSemaphore
GetFileInformationByHandle
CopyFileW
DeleteFileW
IsBadWritePtr
CreateFileW
SetFilePointer
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
GetProcessTimes
Process32NextW
GetCommandLineW
GetExitCodeThread
InterlockedExchange
DeleteCriticalSection
GetFileSizeEx
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetProcessHeap
SetEndOfFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
IsValidCodePage
GetOEMCP
GetACP
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
HeapReAlloc
VirtualFree
GetFileSize
ReadFile
GetStdHandle
ExitProcess
WaitForMultipleObjects
GetCurrentThreadId
LeaveCriticalSection
SetEvent
EnterCriticalSection
ResetEvent
SetProcessShutdownParameters
CreateThread
HeapSize
SetLastError
TlsFree
TlsSetValue
TerminateProcess
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
RaiseException
GetStartupInfoW
HeapFree
IsDebuggerPresent
UnhandledExceptionFilter
GetModuleHandleW
EnumResourceNamesW
InitializeCriticalSection
CreateEventW
SetUnhandledExceptionFilter
SetErrorMode
GetTickCount
CreateProcessW
SetFileAttributesW
WriteFile
WaitForSingleObject
Sleep
GetLastError
GetSystemInfo
GetDiskFreeSpaceExW
GetDriveTypeW
GetLogicalDriveStringsW
GlobalMemoryStatusEx
GetSystemTimeAsFileTime
CloseHandle
GetFileTime
GetVersionExW
GetVolumeInformationW
GetVolumePathNameW
GetSystemDirectoryW
CreateFileA
InterlockedDecrement
InterlockedIncrement
user32
DrawIconEx
GetSysColorBrush
EndPaint
RedrawWindow
LoadImageW
BeginPaint
GetSysColor
SetTimer
EnableWindow
GetForegroundWindow
ShowWindow
DestroyWindow
FlashWindow
AttachThreadInput
SetCursor
CharLowerW
PostMessageW
GetCursorPos
KillTimer
MessageBoxW
LoadCursorW
GetSystemMetrics
ReleaseDC
GetDC
SetRect
SetFocus
DefWindowProcW
LoadStringW
SendMessageW
RegisterClassExW
CreateWindowExW
GetMessageW
DispatchMessageW
AdjustWindowRectEx
SetParent
IsDialogMessageW
TranslateMessage
SetWindowTextW
SetWindowPos
PostQuitMessage
SetWindowLongW
GetWindowLongW
gdi32
SetDIBitsToDevice
StretchBlt
BitBlt
CreateFontIndirectW
GetStockObject
GetObjectW
SelectObject
CreateBitmap
CreateCompatibleDC
GetDeviceCaps
StretchDIBits
gdiplus
GdipDeleteGraphics
GdipDeleteBrush
GdipDrawImageRectI
GdipFillRectangleI
GdipCreateSolidFill
GdipCreateFromHDC
GdipGetImageWidth
GdipLoadImageFromStream
GdiplusShutdown
GdiplusStartup
GdipDisposeImage
GdipGetImageHeight
shlwapi
StrCpyW
AssocQueryStringW
PathCreateFromUrlW
comctl32
InitCommonControlsEx
comdlg32
GetSaveFileNameW
advapi32
GetNamedSecurityInfoW
SetNamedSecurityInfoW
AdjustTokenPrivileges
LookupPrivilegeValueW
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CryptGenRandom
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextW
EqualSid
shell32
ord680
ord155
ShellExecuteW
SHOpenFolderAndSelectItems
ord190
SHGetFolderPathW
ole32
OleSetContainedObject
OleCreate
CoSetProxyBlanket
CoTaskMemFree
GetHGlobalFromStream
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitializeEx
OleLockRunning
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
wininet
HttpOpenRequestW
HttpSendRequestW
InternetQueryOptionW
InternetCloseHandle
HttpQueryInfoW
InternetReadFile
InternetConnectW
InternetSetOptionW
InternetOpenW
HttpQueryInfoA
powrprof
CallNtPowerInformation
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetProcessImageFileNameW
Sections
.text Size: 265KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ