Static task
static1
Behavioral task
behavioral1
Sample
8289c65bac1900c394e7c2c8cc7b25e5aec61eeabc10cc667fa93cf269601954.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8289c65bac1900c394e7c2c8cc7b25e5aec61eeabc10cc667fa93cf269601954.exe
Resource
win10v2004-20240802-en
General
-
Target
8289c65bac1900c394e7c2c8cc7b25e5aec61eeabc10cc667fa93cf269601954
-
Size
145KB
-
MD5
3a4c9a67e28e8529d31d48450496007f
-
SHA1
99bb98671ef170c915e44df16de774af80973e10
-
SHA256
8289c65bac1900c394e7c2c8cc7b25e5aec61eeabc10cc667fa93cf269601954
-
SHA512
de5828379307bf5d8f730bc20702fdf1bb36f50b3a0ce14a7b65893f39c9290337951ba11bd72662f69cfff5fe0d92421dbdcbecaa21ef66ce763749948410ce
-
SSDEEP
3072:2Qb2UidPa/KeiY5cAnmgrvvLrirdCAHZj54HFLaLq8R5PTHpLiAF7yeABf/T:rb2JObr3n1jXSkF+L9TJG8rAp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8289c65bac1900c394e7c2c8cc7b25e5aec61eeabc10cc667fa93cf269601954
Files
-
8289c65bac1900c394e7c2c8cc7b25e5aec61eeabc10cc667fa93cf269601954.exe windows:4 windows x86 arch:x86
b8ed5f58274bef4e7c0b734ee5cb469f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadSelectorEntry
lstrlenA
UpdateResourceA
WritePrivateProfileSectionA
OpenSemaphoreW
GetUserDefaultLCID
GetDiskFreeSpaceW
PostQueuedCompletionStatus
FindResourceExA
GetDefaultCommConfigW
FindFirstFileW
ProcessIdToSessionId
FindVolumeMountPointClose
GetProcessWorkingSetSize
GetSystemInfo
SetProcessWorkingSetSize
FatalAppExitA
GetStdHandle
OpenWaitableTimerW
EnumSystemLanguageGroupsW
FindResourceExW
CloseHandle
CreateSemaphoreW
SetSystemPowerState
FoldStringA
FreeEnvironmentStringsW
GetFileAttributesW
LocalUnlock
_lopen
GlobalWire
CreateEventW
DebugBreak
WaitForMultipleObjects
IsValidLocale
FatalExit
shell32
SHLoadNonloadedIconOverlayIdentifiers
SHQueryRecycleBinW
RealShellExecuteExA
DragQueryPoint
SHPathPrepareForWriteW
user32
SetParent
GetShellWindow
IsRectEmpty
OffsetRect
GetClassInfoExW
SendDlgItemMessageW
IMPGetIMEA
GetClassNameW
OpenInputDesktop
TranslateMDISysAccel
RemoveMenu
ChangeMenuA
GetNextDlgTabItem
DestroyWindow
CascadeChildWindows
GetSysColor
HideCaret
SetDlgItemTextA
DialogBoxParamA
BroadcastSystemMessageA
IMPQueryIMEA
DrawCaption
GetGuiResources
GetPropW
CharLowerW
IsCharAlphaNumericA
IsCharLowerW
DragObject
SetWindowsHookW
DdeReconnect
MessageBoxIndirectA
DestroyCursor
CreateAcceleratorTableW
BeginDeferWindowPos
CloseWindow
EnumPropsA
DdeInitializeW
FlashWindowEx
LockWindowUpdate
GetPropA
GetProcessDefaultLayout
SetMessageExtraInfo
DdeAbandonTransaction
WinHelpA
ScreenToClient
CreateIconFromResource
DeleteMenu
GetClientRect
MessageBoxExW
ToUnicode
SendMessageTimeoutW
GetParent
EnumDesktopWindows
WindowFromDC
RegisterWindowMessageW
SetSystemCursor
GetClassWord
IsZoomed
CallNextHookEx
IsDialogMessageA
GetSystemMetrics
GetCursorInfo
LoadMenuA
AnimateWindow
GetWindow
RegisterDeviceNotificationW
DdeFreeStringHandle
CreateIconFromResourceEx
SetRectEmpty
SendNotifyMessageW
EnableMenuItem
InvertRect
EnumDisplayMonitors
InsertMenuW
ChildWindowFromPointEx
GetGUIThreadInfo
EmptyClipboard
SetMenuItemBitmaps
SetPropA
ShowScrollBar
CheckDlgButton
IsChild
ExcludeUpdateRgn
GetAltTabInfoW
DefFrameProcW
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE