Static task
static1
Behavioral task
behavioral1
Sample
8ba0813a4dcc6704f714f51b419f5e328a13e260727f8d19c757b1fa9498f6a0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ba0813a4dcc6704f714f51b419f5e328a13e260727f8d19c757b1fa9498f6a0.exe
Resource
win10v2004-20240802-en
General
-
Target
8ba0813a4dcc6704f714f51b419f5e328a13e260727f8d19c757b1fa9498f6a0
-
Size
264KB
-
MD5
156b2921f959fa4e11d8663ab8ac994b
-
SHA1
bdf5e1c53b829d41b9cbe429cf3bd784a631edc0
-
SHA256
8ba0813a4dcc6704f714f51b419f5e328a13e260727f8d19c757b1fa9498f6a0
-
SHA512
3b9ccad5572f694d899a25dad80b0dd73bf835cdf763fdb2225796d6333671e8fe91024145a210fd53d97e6a8b88f0aeef11d37148428afc6a41c575c757eaa4
-
SSDEEP
3072:mi5je3zhO1fw7G/c7rcz7y38o/jwsIDUAtBjHgG33+K5NSDVH2pHgvS+zkm5ZS8L:YczforkUoT33+KLwVH2pAvS+/3cjKH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ba0813a4dcc6704f714f51b419f5e328a13e260727f8d19c757b1fa9498f6a0
Files
-
8ba0813a4dcc6704f714f51b419f5e328a13e260727f8d19c757b1fa9498f6a0.exe windows:6 windows x64 arch:x64
142599c8b88b85757e5ee4b4abbb36b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
user32
AdjustWindowRectEx
AppendMenuA
BeginPaint
CheckDlgButton
CheckMenuItem
CloseClipboard
CreateMenu
CreateWindowExA
DefDlgProcA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
DrawMenuBar
EmptyClipboard
EnableMenuItem
EnableWindow
EndPaint
GetClientRect
GetDC
GetDlgItemTextA
GetKeyboardState
GetMenu
GetMenuItemCount
GetMenuItemRect
GetMessageA
GetSysColor
GetWindowLongPtrA
GetWindowRect
IntersectRect
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
KillTimer
LoadCursorA
LoadIconA
MessageBeep
MessageBoxA
OffsetRect
OpenClipboard
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetCapture
SetClipboardData
SetForegroundWindow
SetMenu
SetRect
SetTimer
SetWindowLongPtrA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
UnionRect
WinHelpA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreateFontIndirectA
CreateHatchBrush
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
Ellipse
EndDoc
EndPage
ExtTextOutW
GetDeviceCaps
GetStockObject
GetTextExtentPoint32A
GetTextExtentPoint32W
GetTextMetricsA
IntersectClipRect
Polygon
Polyline
Rectangle
SelectClipRgn
SelectObject
SetBkMode
SetMapMode
SetPixel
SetTextColor
StartDocA
StartPage
comdlg32
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
comctl32
ord17
kernel32
CloseHandle
CompareStringW
CreateFileW
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExA
FindNextFileA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LocalFree
MulDiv
MultiByteToWideChar
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleW
ReadFile
RtlCaptureContext
RtlLookupFunctionEntry
RtlUnwindEx
RtlVirtualUnwind
SetEndOfFile
SetEnvironmentVariableA
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
Sections
.00cfg Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ