Static task
static1
Behavioral task
behavioral1
Sample
de82fc867a6f3ebcff07aef072aa0a1b722ee90496bdef4c7fa2a50a42f40da7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de82fc867a6f3ebcff07aef072aa0a1b722ee90496bdef4c7fa2a50a42f40da7.exe
Resource
win10v2004-20240802-en
General
-
Target
de82fc867a6f3ebcff07aef072aa0a1b722ee90496bdef4c7fa2a50a42f40da7
-
Size
242KB
-
MD5
8aee2b86432efdd93dfff3897f158275
-
SHA1
37876b16d68c305f94baebdcf022582345763a52
-
SHA256
de82fc867a6f3ebcff07aef072aa0a1b722ee90496bdef4c7fa2a50a42f40da7
-
SHA512
10fd71addb8f8b385c6f380624e02e025f7ba0d76dd7f0781d6a310dc891327e20a1f18bed55d83011bd9feb0796417408b295a36ec7d1455ee3c64e4c6de49b
-
SSDEEP
6144:CbO/Wb9uwgKQ2n3zTtz3cGNYYpuCPIzEP1c:CbO/yeT23CzEP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de82fc867a6f3ebcff07aef072aa0a1b722ee90496bdef4c7fa2a50a42f40da7
Files
-
de82fc867a6f3ebcff07aef072aa0a1b722ee90496bdef4c7fa2a50a42f40da7.exe windows:5 windows x64 arch:x64
0c951f5b58e134ffed42fcc07b958e6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCommandLineA
HeapAlloc
HeapFree
RtlUnwindEx
RtlLookupFunctionEntry
RaiseException
RtlPcToFileHeader
HeapReAlloc
HeapQueryInformation
HeapSize
Sleep
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlCaptureContext
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
EncodePointer
DecodePointer
FlsGetValue
FlsFree
FlsAlloc
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetModuleHandleW
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
CloseHandle
GlobalFlags
lstrcmpA
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
CompareStringA
lstrcmpW
GetVersionExA
GlobalLock
GlobalUnlock
GetCurrentProcessId
GlobalGetAtomNameA
GlobalAddAtomA
MultiByteToWideChar
WideCharToMultiByte
SetLastError
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcatA
lstrlenA
GetModuleFileNameA
GetLastError
CreateEventA
VirtualAlloc
ReadFile
GetFileSize
CreateFileA
GetTickCount
GetModuleHandleA
GetCurrentProcess
ExitProcess
IsDebuggerPresent
LoadLibraryA
FlsSetValue
GetProcAddress
user32
PostQuitMessage
ValidateRect
LoadCursorA
ClientToScreen
SetWindowTextA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
UnhookWindowsHookEx
GetMessagePos
MapWindowPoints
SetForegroundWindow
MessageBoxA
GetClassInfoExA
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetClassNameA
DestroyMenu
WinHelpA
GetWindowThreadProcessId
IsWindowEnabled
SendMessageA
EnableWindow
GetMenu
GetDlgItem
GetDlgCtrlID
GetKeyState
LoadIconA
PeekMessageA
GetCapture
IsIconic
GetSysColorBrush
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DispatchMessageA
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetParent
CreateWindowExA
IsWindow
GetWindowLongA
GetClientRect
SetWindowPos
AdjustWindowRectEx
GetSystemMetrics
GetClassInfoA
CopyRect
GetLastActivePopup
PostMessageA
SetMenu
GetWindow
GetSysColor
PtInRect
GetDC
ReleaseDC
GetWindowRect
GetMessageTime
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
SetViewportExtEx
SetViewportOrgEx
OffsetViewportOrgEx
Escape
TextOutA
RectVisible
PtVisible
SelectObject
SetMapMode
RestoreDC
SaveDC
ExtTextOutA
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
DeleteDC
DeleteObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
psapi
EnumProcesses
Sections
.text Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ