Static task
static1
Behavioral task
behavioral1
Sample
8d4580ac1d6b4a179cd51388fa9a7e7bdf2daeb20e72a0faf6f589a3365e4b83.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8d4580ac1d6b4a179cd51388fa9a7e7bdf2daeb20e72a0faf6f589a3365e4b83.exe
Resource
win10v2004-20240226-en
General
-
Target
8d4580ac1d6b4a179cd51388fa9a7e7bdf2daeb20e72a0faf6f589a3365e4b83
-
Size
9.7MB
-
MD5
26e85d61e648a7f37cf80d1070caff6c
-
SHA1
da5221c4901048698b91cfadc68cffc85754416b
-
SHA256
8d4580ac1d6b4a179cd51388fa9a7e7bdf2daeb20e72a0faf6f589a3365e4b83
-
SHA512
fa01a9ca5272cfeb958af31031c5024392da7eef9cea801381dfa9ad334351f2100014810c4e12442330cb617e0d25801c7bb25211defdb1fdf89855846987b8
-
SSDEEP
98304:0GpY8Jj+puuuuuuunuuuuSuuuuuuunuuuubFY66666666666666666666666666o:0G7F+AFDDv2DFA1RDv2DFM1qgMoT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d4580ac1d6b4a179cd51388fa9a7e7bdf2daeb20e72a0faf6f589a3365e4b83
Files
-
8d4580ac1d6b4a179cd51388fa9a7e7bdf2daeb20e72a0faf6f589a3365e4b83.exe windows:4 windows x86 arch:x86
5266df50251df2fa9f2ea74c258676d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
js32
JS_GetElement
JS_Enumerate
JS_IsArrayObject
JS_GetProperty
JS_DestroyIdArray
JS_ValueToString
JS_GetStringBytes
JS_GetArrayLength
JS_IdToValue
JS_GetClass
JS_NewArrayObject
JS_SetElement
JS_ReportError
JS_DefineFunction
JS_DeleteProperty
JS_DefinePropertyWithTinyId
JS_GC
JS_IsRunning
JS_DestroyContext
JS_ValueToObject
JS_TypeOfValue
JS_EvaluateScript
JS_NewStringCopyZ
JS_Finish
JS_SetProperty
JS_Init
JS_ValueToNumber
JS_NewDoubleValue
JS_NewContext
JS_SetErrorReporter
JS_ConvertStub
JS_ResolveStub
JS_EnumerateStub
JS_FinalizeStub
JS_NewObject
JS_InitStandardClasses
JS_DefineObject
JS_PropertyStub
JS_SetBranchCallback
JS_GetFunctionName
JS_ConstructObject
JS_InitClass
JS_DefineProperties
JS_GetPrivate
JS_SetPrivate
kernel32
GetTempPathA
GetSystemDirectoryA
GetVolumeInformationA
_hwrite
_hread
GetModuleFileNameA
GetDiskFreeSpaceA
Sleep
GetPrivateProfileStringA
WritePrivateProfileStringA
GetWindowsDirectoryA
GetProfileStringA
GetProfileIntA
OutputDebugStringA
WinExec
GlobalFlags
GlobalSize
Beep
GetCPInfo
GetACP
DebugBreak
_lclose
_lwrite
_llseek
_lcreat
_lopen
GetVersionExA
GetFileTime
GetDriveTypeA
GetFullPathNameA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
GetOEMCP
LCMapStringA
LCMapStringW
RaiseException
UnhandledExceptionFilter
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetStringTypeA
GetStringTypeW
SetStdHandle
CompareStringA
CompareStringW
SetFileTime
GlobalDeleteAtom
GlobalAddAtomA
FindNextFileA
SetCurrentDirectoryA
CreateDirectoryA
MoveFileA
DeleteFileA
RemoveDirectoryA
ReadFile
FlushFileBuffers
WriteFile
FindFirstFileA
SetEndOfFile
SetFilePointer
CreateFileA
FindClose
GetFileAttributesA
GetFileSize
GetTempFileNameA
CloseHandle
GetCurrentProcess
SetLastError
GlobalHandle
SetErrorMode
lstrcatA
OpenFile
GetLastError
GlobalAlloc
GetSystemInfo
GlobalReAlloc
FindResourceA
GlobalFree
GetCurrentProcessId
lstrcmpiA
LoadResource
GetVersion
GlobalUnlock
lstrcpynA
LoadLibraryA
FreeLibrary
GetProcAddress
GlobalLock
WideCharToMultiByte
IsBadStringPtrA
IsBadReadPtr
LockResource
lstrcpyA
MultiByteToWideChar
GetTickCount
FreeResource
lstrlenA
SetEnvironmentVariableA
lstrcmpA
GetCurrentDirectoryA
GlobalGetAtomNameA
GetModuleHandleA
GlobalMemoryStatus
user32
DestroyCursor
SetCursor
CreateCursor
ClientToScreen
LoadIconA
LoadBitmapA
DrawFocusRect
ShowWindow
SetFocus
GetDlgItem
GetActiveWindow
GetWindowThreadProcessId
SetCapture
ReleaseCapture
SendDlgItemMessageA
CreateDialogParamA
EnumChildWindows
ScreenToClient
CharPrevA
DestroyCaret
InvertRect
HideCaret
CharLowerA
ExitWindowsEx
ValidateRect
EqualRect
GetCursorPos
SetWindowTextA
GetKeyState
IsCharLowerA
CreateWindowExA
SystemParametersInfoA
EnumWindows
wsprintfA
PostQuitMessage
DispatchMessageA
TranslateMessage
GetAsyncKeyState
ToAscii
GetMessageA
IsDialogMessageA
SetForegroundWindow
IsIconic
SetActiveWindow
GetLastActivePopup
DeleteMenu
GetSystemMenu
GetDialogBaseUnits
BringWindowToTop
AppendMenuA
GetMenuStringA
GetMenuState
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
DestroyMenu
DrawMenuBar
RemoveMenu
GetMenu
ModifyMenuA
EnableMenuItem
IsZoomed
DdeUninitialize
DdeFreeStringHandle
DdeDisconnect
DdeFreeDataHandle
DdeClientTransaction
DdeCreateStringHandleA
DdeConnect
DdeInitializeA
SetSysColors
SetCursorPos
SetMenu
CreateMenu
LoadAcceleratorsA
TranslateAcceleratorA
SetMessageQueue
ShowOwnedPopups
GetUpdateRect
MessageBoxA
MessageBeep
ScrollDC
LoadStringA
SendMessageTimeoutA
SetPropA
RemovePropA
GetPropA
GetWindowDC
AdjustWindowRect
GetTopWindow
GetClipboardData
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetDlgItemTextA
SetDlgItemTextA
CreateCaret
SetCaretPos
ShowCaret
UnionRect
CharNextA
InflateRect
GetClassLongA
SetWindowLongA
SetWindowPos
GetWindowLongA
OffsetRect
GetWindowTextA
GetSysColor
FrameRect
GetNextDlgGroupItem
SendMessageA
GetWindowWord
GetDlgCtrlID
GetCapture
SetWindowWord
InvalidateRect
UpdateWindow
DefWindowProcA
PeekMessageA
PtInRect
CharUpperA
DefDlgProcA
GetDC
ReleaseDC
GetSystemMetrics
MoveWindow
SetTimer
KillTimer
BeginPaint
SetRect
DrawTextA
EndPaint
GetClientRect
FillRect
EndDialog
GetClassInfoA
LoadCursorA
RegisterClassA
DialogBoxParamA
GetClassNameA
GetParent
GetWindowRect
GetWindow
IntersectRect
IsWindow
IsWindowVisible
GetWindowPlacement
GetFocus
GetSubMenu
DestroyWindow
IsWindowEnabled
PostMessageA
EnableWindow
gdi32
CreateICA
GetTextMetricsA
SetDIBits
SetTextAlign
GetStockObject
CreatePen
GetRgnBox
GetViewportOrgEx
SetViewportOrgEx
GetDCOrgEx
OffsetRgn
CreateRectRgnIndirect
SetRectRgn
CombineRgn
CreateDCA
EndPage
EndDoc
AbortDoc
Escape
SetAbortProc
StartDocA
StartPage
CreateDiscardableBitmap
DeleteMetaFile
CloseMetaFile
CreateMetaFileA
GetViewportExtEx
OffsetWindowOrgEx
GetWindowOrgEx
SetWindowOrgEx
Polyline
Polygon
Arc
RoundRect
GetTextExtentPoint32A
SelectPalette
StretchDIBits
DeleteObject
LPtoDP
SetViewportExtEx
RealizePalette
SetMapMode
DeleteDC
SetWindowExtEx
BitBlt
CreateCompatibleDC
SelectObject
UnrealizeObject
CreatePatternBrush
StretchBlt
CreateSolidBrush
SetTextColor
CreateBitmap
LineTo
MoveToEx
TextOutA
GetTextColor
EnumFontsA
GetSystemPaletteUse
GetBkColor
RestoreDC
SetBkColor
SaveDC
Rectangle
SetROP2
GetBitmapBits
GetSystemPaletteEntries
GetObjectA
SetSystemPaletteUse
CreatePalette
GetDeviceCaps
GetNearestPaletteIndex
GetDIBits
GetPaletteEntries
CreateCompatibleBitmap
GetPixel
RectVisible
ExtFloodFill
GetNearestColor
SetPixel
CreateDIBitmap
SelectClipRgn
SetStretchBltMode
CreateFontIndirectA
PatBlt
ExcludeClipRect
CreateRectRgn
GetClipBox
ExtTextOutA
SetTextCharacterExtra
Ellipse
IntersectClipRect
SetBkMode
Pie
GetOutlineTextMetricsA
comdlg32
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
shell32
SHAppBarMessage
ShellExecuteA
winspool.drv
GetPrinterA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
winmm
waveOutGetNumDevs
advapi32
RegQueryValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueA
mpr
WNetEnumResourceA
WNetOpenEnumA
WNetCloseEnum
ole32
CreateFileMoniker
OleLoad
CoCreateInstance
OleInitialize
CreateGenericComposite
CreateItemMoniker
MkParseDisplayName
CreateBindCtx
OleSetMenuDescriptor
CLSIDFromString
OleUninitialize
OleSetContainedObject
GetHGlobalFromILockBytes
StgOpenStorageOnILockBytes
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
OleCreateStaticFromData
OleDraw
CoUninitialize
OleSave
CoInitialize
Sections
.text Size: 1013KB - Virtual size: 1013KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 626KB - Virtual size: 625KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ