e:\eoi\tsuufa\tweyzuj\ibzmf\footscvbuo.pdb
Static task
static1
Behavioral task
behavioral1
Sample
692c2ef6a6c769f958370224d1a19070N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
692c2ef6a6c769f958370224d1a19070N.exe
Resource
win10v2004-20240709-en
General
-
Target
692c2ef6a6c769f958370224d1a19070N.exe
-
Size
716KB
-
MD5
692c2ef6a6c769f958370224d1a19070
-
SHA1
66c6d9347bb46c07c9086072699de716da877065
-
SHA256
119688e546aafa0df1563c06853cb6860a2ec31ac1b5f88d05229d6a1d79b3ea
-
SHA512
ffc4e52cb69de801080531874276dbd2b66aaacb697f1cf0b8a1b187e5e9eb48cfe5c8344772f765429b11c88ead82c08bcc75a67e09091b78f8359ec7af83b3
-
SSDEEP
12288:7q1H2kgjxOH/SCmlat5Was5jrr6rX+kbt7IeYQ+E7+v2d:7WW1OfSCmli5JQr6b35XXd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 692c2ef6a6c769f958370224d1a19070N.exe
Files
-
692c2ef6a6c769f958370224d1a19070N.exe.exe windows:4 windows x86 arch:x86
0b2ede1b9095996a6351e2f9f2c6bd46
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
ImageList_Merge
ImageList_SetBkColor
CreatePropertySheetPage
ImageList_GetIcon
ImageList_ReplaceIcon
CreateUpDownControl
ImageList_DrawIndirect
ImageList_SetFlags
InitCommonControlsEx
DrawInsert
ImageList_DragLeave
ImageList_EndDrag
user32
LoadCursorFromFileW
ChangeClipboardChain
RegisterClassExA
BringWindowToTop
CheckRadioButton
DestroyWindow
DlgDirSelectExW
SetCaretBlinkTime
CreateWindowExW
SendIMEMessageExW
SetMenuItemBitmaps
GetDlgItem
MessageBoxW
EnumPropsW
GetUpdateRgn
ShowWindow
EmptyClipboard
DefWindowProcW
LoadCursorA
CallWindowProcA
MessageBoxA
GetMessageW
GetTabbedTextExtentW
ShowOwnedPopups
ShowScrollBar
IsCharUpperA
BroadcastSystemMessageW
GetQueueStatus
PtInRect
PostMessageW
GetClassNameA
GetWindowTextLengthW
ToAsciiEx
EnumDisplayDevicesA
GetDlgItemInt
GetFocus
SetScrollRange
IsWindowUnicode
SetWindowsHookExA
GetCaretBlinkTime
GetMenuItemID
IsIconic
SetClassWord
RegisterClassA
GetCapture
DdeCreateDataHandle
MenuItemFromPoint
PostThreadMessageA
ChangeMenuW
CharNextA
GetDlgItemTextA
LoadCursorW
DdeInitializeA
CreateIconIndirect
PostThreadMessageW
NotifyWinEvent
kernel32
EnterCriticalSection
VirtualProtect
WriteConsoleA
OpenFileMappingW
WriteFile
MultiByteToWideChar
FlushInstructionCache
GetModuleFileNameW
CreatePipe
DebugActiveProcess
ConvertDefaultLocale
LoadResource
MapViewOfFileEx
lstrlenA
GetProcAddress
GetTimeFormatA
OpenWaitableTimerA
VirtualQuery
OpenMutexA
SuspendThread
DeleteFileA
IsBadWritePtr
SetThreadPriority
TlsFree
GetLastError
lstrcpyA
RtlUnwind
IsDebuggerPresent
SetConsoleCP
FreeLibraryAndExitThread
EnumTimeFormatsW
TlsSetValue
InterlockedExchange
GetOEMCP
QueryPerformanceCounter
GetSystemTimeAdjustment
IsBadReadPtr
GetComputerNameW
HeapDestroy
SetStdHandle
GetSystemInfo
InitializeCriticalSectionAndSpinCount
lstrcpynW
ReadFile
GetUserDefaultLCID
GlobalHandle
GetCurrentProcess
GetCPInfo
SetLastError
SetSystemTime
InterlockedCompareExchange
GlobalFindAtomA
HeapLock
GetTempFileNameW
ExitProcess
DuplicateHandle
GetProcAddress
GetFileSize
FlushFileBuffers
ReadConsoleW
LoadLibraryA
SetHandleCount
GetTickCount
VirtualQueryEx
CreateWaitableTimerA
GetPrivateProfileIntW
GetFileType
GetLogicalDriveStringsA
FindResourceA
UnhandledExceptionFilter
GetConsoleScreenBufferInfo
ExitThread
lstrcmpi
WritePrivateProfileSectionW
GetEnvironmentStringsW
GetCurrentThreadId
GetTempPathA
GetACP
GetDateFormatA
IsValidLocale
GetCommandLineA
LCMapStringA
HeapSize
TlsAlloc
FindAtomA
EnumSystemLocalesA
VirtualAlloc
LocalFree
VirtualUnlock
GetCurrentDirectoryA
WideCharToMultiByte
DeleteCriticalSection
CreateMutexA
WaitForMultipleObjects
GetStartupInfoW
GetModuleHandleA
GetLocaleInfoW
SetThreadAffinityMask
VirtualLock
GetLocaleInfoA
GetThreadPriority
HeapCreate
GetStdHandle
SetFilePointer
GlobalReAlloc
IsValidCodePage
LocalUnlock
GetVersionExA
SetLocalTime
GetCommandLineW
GetShortPathNameW
CompareStringW
EnumDateFormatsW
GetNamedPipeInfo
GetDiskFreeSpaceA
LeaveCriticalSection
InitializeCriticalSection
HeapReAlloc
GetStartupInfoA
GetProfileStringA
GetNamedPipeHandleStateW
TlsGetValue
lstrlenW
HeapAlloc
GetConsoleCP
CloseHandle
GetProfileSectionA
GetCurrentProcessId
GetCurrentThread
GetExitCodeProcess
TransmitCommChar
SetEnvironmentVariableA
LCMapStringW
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GlobalDeleteAtom
VirtualFree
GetStringTypeW
FreeEnvironmentStringsA
EnumResourceLanguagesA
GetModuleFileNameA
TerminateProcess
GetTimeZoneInformation
CompareStringA
HeapFree
GetStringTypeA
GetEnvironmentStrings
VirtualProtectEx
FindClose
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ