Static task
static1
Behavioral task
behavioral1
Sample
e8f43edcc891af03008204929947e9c992cc875c13792780c6e50ffcb2d8af8c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8f43edcc891af03008204929947e9c992cc875c13792780c6e50ffcb2d8af8c.exe
Resource
win10v2004-20240508-en
General
-
Target
e8f43edcc891af03008204929947e9c992cc875c13792780c6e50ffcb2d8af8c
-
Size
172KB
-
MD5
c892fab7b3669d88a7356edf0fd295aa
-
SHA1
5dc2a6023cbed522f3399700683ed6ba48dce1a6
-
SHA256
e8f43edcc891af03008204929947e9c992cc875c13792780c6e50ffcb2d8af8c
-
SHA512
f62205a4227924d7299424e56e1d609fd1423fb13b30f317260c1cb5b1d91bdc32e44f5c9e0f0571235ad4f5c4274edecc07390c6f7a1d79753533c6b54e8f81
-
SSDEEP
3072:dCWzNpqOOlcaNZaSKUfg001zzghXgIUl/Gec6uz/8nwuot:EsIlcMaLWazzgBgIBUuz/8nwX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e8f43edcc891af03008204929947e9c992cc875c13792780c6e50ffcb2d8af8c
Files
-
e8f43edcc891af03008204929947e9c992cc875c13792780c6e50ffcb2d8af8c.exe windows:4 windows x86 arch:x86
eedca26f11bb5fdcd7a8c5911ec5d0bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
cstool
ord1261
ord1260
cawvapi
ord41
ord6
ord7
ord45
ord1
ord2
ord3
ord4
asbrdcst
ord107
ord105
ord109
ord108
cheyprod
ord400
wsock32
gethostbyname
WSAStartup
WSACleanup
gethostbyaddr
kernel32
RtlUnwind
GetLocalTime
GetStartupInfoA
TerminateProcess
HeapFree
CreateThread
ExitThread
ExitProcess
RaiseException
GetCommandLineA
HeapAlloc
GetACP
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
HeapReAlloc
GetStdHandle
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetTickCount
GetTempPathA
SetHandleCount
CreateFileA
GetLastError
FormatMessageA
lstrlenA
SetFilePointer
LockFile
FlushFileBuffers
ReadFile
GetCurrentProcess
SetErrorMode
GetOEMCP
GetCPInfo
SizeofResource
GetProcessVersion
WriteFile
WritePrivateProfileStringA
LocalReAlloc
GlobalFlags
TlsGetValue
GetFileType
GlobalReAlloc
UnlockFile
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
TlsFree
InitializeCriticalSection
DeleteCriticalSection
TlsAlloc
SetLastError
LocalAlloc
MulDiv
GlobalGetAtomNameA
GetVersion
lstrcatA
GetModuleHandleA
GlobalAddAtomA
GlobalFindAtomA
LockResource
GlobalUnlock
GlobalFree
MultiByteToWideChar
FindResourceA
LoadResource
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
ResumeThread
SuspendThread
SetThreadPriority
GlobalDeleteAtom
GlobalLock
GlobalAlloc
GetCurrentThread
lstrcmpA
lstrcmpiA
GetComputerNameA
GetCurrentThreadId
GetProcAddress
SetEvent
ResetEvent
GetExitCodeThread
lstrcpyA
CreateEventA
WaitForSingleObject
GetEnvironmentVariableA
lstrcpynA
GetVersionExA
GetEnvironmentStringsW
CloseHandle
FreeLibrary
LoadLibraryA
GetProfileStringA
GetModuleFileNameA
LocalFree
user32
ScreenToClient
SetFocus
MapWindowPoints
SendDlgItemMessageA
AdjustWindowRectEx
GetDC
ReleaseDC
CopyRect
SetWindowTextA
ShowWindow
ClientToScreen
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
IsDialogMessageA
PtInRect
LoadCursorA
GetSysColorBrush
DestroyMenu
InflateRect
GetTopWindow
DrawTextA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GrayStringA
GetClassNameA
GetClassLongA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
LoadStringA
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetCapture
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SetCursor
PostQuitMessage
InvalidateRect
UpdateWindow
LoadBitmapA
GetSysColor
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
PostMessageA
wsprintfA
MessageBoxA
DefWindowProcA
CreateWindowExA
SetPropA
CharNextA
FindWindowA
SetWindowPos
SetForegroundWindow
GetPropA
CallNextHookEx
GetKeyState
SetMenuItemBitmaps
IsWindowUnicode
HideCaret
ExcludeUpdateRgn
UnregisterClassA
DefDlgProcA
ShowCaret
DrawFocusRect
gdi32
CreatePen
CreateCompatibleDC
CreateBitmap
GetMapMode
GetClipBox
SetTextColor
GetObjectA
PatBlt
SetBkColor
DeleteDC
RestoreDC
SelectObject
SaveDC
SetBkMode
GetStockObject
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
BitBlt
GetTextExtentPointA
CreateDIBitmap
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
comctl32
ord17
Sections
.text Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ