Static task
static1
Behavioral task
behavioral1
Sample
8239709fe7157c9158300e655720a74c682ce752a07d14034a3dfb3fbe93663d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8239709fe7157c9158300e655720a74c682ce752a07d14034a3dfb3fbe93663d.exe
Resource
win10v2004-20240426-en
General
-
Target
8239709fe7157c9158300e655720a74c682ce752a07d14034a3dfb3fbe93663d
-
Size
191KB
-
MD5
866c1902d29f94601938b54c733cc783
-
SHA1
fba76ca389b98758ac1ffecbabcd2c840909b704
-
SHA256
8239709fe7157c9158300e655720a74c682ce752a07d14034a3dfb3fbe93663d
-
SHA512
3ff04339c9bc8f530a2df8cc80dd568d0047010626220f0d1696c0c2af98d55ec027e2e78f51a1440f9ca738c22794d4fee260207e4b72aa2b0bca8dc456f684
-
SSDEEP
3072:pGvx1nIt5HVADO/e5v96X1dm/ch0HGvF1nIIYT2IKDm1hv:pG65HZmv6kHGa2IKa1h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8239709fe7157c9158300e655720a74c682ce752a07d14034a3dfb3fbe93663d
Files
-
8239709fe7157c9158300e655720a74c682ce752a07d14034a3dfb3fbe93663d.exe windows:4 windows x86 arch:x86
e3046f405a5240ce94c63170f709cbe1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
EnumSystemLocalesA
GetCurrentDirectoryW
LeaveCriticalSection
SetFilePointer
FileTimeToLocalFileTime
OpenEventW
SetEndOfFile
SetEnvironmentVariableA
GetVersionExA
GetExitCodeProcess
GetDateFormatA
InterlockedExchange
GetConsoleOutputCP
HeapFree
DeleteCriticalSection
DeleteFileW
FindFirstFileW
GlobalLock
GetStartupInfoA
GetLocaleInfoA
GetStringTypeA
ReadFile
GetModuleFileNameW
GetCommandLineA
SetLastError
GetACP
GetSystemTimeAsFileTime
CompareStringW
InterlockedDecrement
GetTempPathW
IsValidCodePage
MulDiv
LocalFree
GetCPInfo
GlobalSize
FindClose
lstrcpynW
VirtualAllocEx
GetProcAddress
LoadLibraryA
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
HeapSize
VirtualQuery
RtlUnwind
IsBadWritePtr
VirtualAlloc
HeapAlloc
FlushFileBuffers
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteFile
GetCurrentProcess
TerminateProcess
ExitProcess
GetLastError
GetModuleHandleA
lstrlenW
WaitForSingleObject
GetDriveTypeA
GetSystemInfo
CloseHandle
QueryPerformanceCounter
CreateFileW
GetStdHandle
WriteConsoleW
VirtualProtect
lstrcmpiW
GetProcessHeap
GetDateFormatW
GetCurrentDirectoryA
HeapReAlloc
GetOEMCP
SetStdHandle
FindResourceW
MultiByteToWideChar
GetStringTypeW
GetVersionExW
FileTimeToSystemTime
lstrcmpW
GlobalUnlock
FormatMessageW
CreateMutexW
VirtualFree
GlobalFree
GetModuleFileNameA
GetTimeZoneInformation
CreateEventW
UnhandledExceptionFilter
TlsFree
CreateFileA
SetUnhandledExceptionFilter
lstrcatW
user32
GetMenuItemCount
CallWindowProcA
GetMenuItemID
PtInRect
OpenClipboard
DrawEdge
CreateDialogIndirectParamW
SetForegroundWindow
CreateCursor
GetMenuStringW
GetWindowRect
IsChild
CreateCaret
GetSystemMetrics
GetMenuState
FrameRect
DialogBoxParamW
DrawMenuBar
DestroyCaret
MapWindowPoints
IsIconic
FillRect
ToAscii
UpdateWindow
SetParent
TrackPopupMenu
EnableMenuItem
GetDC
SetScrollPos
GetMonitorInfoW
wsprintfW
AppendMenuW
DispatchMessageW
RealChildWindowFromPoint
GetSubMenu
ModifyMenuW
ReleaseCapture
DestroyWindow
RedrawWindow
GetKeyState
GetKeyboardState
LoadImageW
BeginDeferWindowPos
InsertMenuW
LoadBitmapW
CheckMenuItem
DrawFrameControl
SetFocus
ShowCaret
TranslateMessage
WindowFromPoint
GetFocus
SendDlgItemMessageW
GetClassNameW
CreateMenu
EndDeferWindowPos
LoadMenuW
GetActiveWindow
GetSysColor
SetCursor
ShowScrollBar
SetDlgItemTextW
RegisterClassExW
DrawTextExW
InflateRect
DestroyIcon
gdi32
DPtoLP
Rectangle
SetTextColor
SetBrushOrgEx
SetROP2
CreatePatternBrush
GetDeviceCaps
SetBkColor
CreatePen
CreateSolidBrush
CreateFontW
GetROP2
EndDoc
CreateCompatibleDC
SelectObject
CreateBitmap
GetPixel
ExtTextOutW
SaveDC
MoveToEx
GetTextMetricsW
DeleteObject
SetTextAlign
CreateHatchBrush
StartPage
GetObjectW
DeleteDC
GetStockObject
GetTextExtentPoint32W
SetBkMode
SetWindowOrgEx
BitBlt
CreateFontIndirectW
RemoveFontResourceW
comdlg32
ChooseFontA
GetSaveFileNameA
ChooseColorW
GetFileTitleW
GetFileTitleA
PageSetupDlgW
GetSaveFileNameW
ChooseFontW
PrintDlgA
GetOpenFileNameW
FindTextW
PrintDlgW
ChooseColorA
PageSetupDlgA
ReplaceTextA
ReplaceTextW
FindTextA
GetOpenFileNameA
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 51KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zoitxld Size: - Virtual size: 76KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE