Static task
static1
Behavioral task
behavioral1
Sample
08475899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08475899.exe
Resource
win10v2004-20230220-en
General
-
Target
08475899.exe
-
Size
326KB
-
MD5
eb392eb1b3d33e2559343d530a1b546d
-
SHA1
b0b63af55d7c53ec15d287c835b3876b9fdebf15
-
SHA256
0769315bba7b57606f1949f13c30f2e193bf0ed18d8fc7b37a7f11721b124091
-
SHA512
a230cc8809b15aea628bc04fe8c209ef4f71e1a3800a8bbf507d515ea8a88bbfea626008e18bb0f45709fd121b29b6526396912ee9afd89a306a31ad0409572e
-
SSDEEP
3072:EXHXAk6Cm3stxdS45BKPkBxxQ7YafNK4br2jmONzG6Bv7rqzSRvXfpS:+XFk3sLsPkBxufNXbr2jdzJv730
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 08475899.exe
Files
-
08475899.exe.exe windows x86
d0fa90ab077085f07c566a80dea00339
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathW
AllocConsole
GetConsoleAliasExesLengthA
LoadResource
InterlockedIncrement
InterlockedDecrement
WaitNamedPipeA
OpenSemaphoreA
FreeEnvironmentStringsA
GetProcessPriorityBoost
EnumCalendarInfoExW
EnumTimeFormatsA
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
GetVolumeInformationA
GetCalendarInfoA
GetFileAttributesW
WriteConsoleW
SetSystemPowerState
lstrcatA
CompareStringW
GetVolumePathNameA
EnumSystemLocalesA
GlobalUnfix
GetProfileIntA
DeleteFiber
GlobalFix
GetCurrentDirectoryW
GetProcAddress
SetComputerNameA
ResetEvent
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
OpenWaitableTimerW
SetFileApisToANSI
QueryDosDeviceW
AddAtomA
GetPrivateProfileStructA
SetSystemTime
GetModuleFileNameA
FindNextFileA
FindFirstVolumeMountPointA
EnumDateFormatsA
CreateIoCompletionPort
GetModuleHandleA
FreeEnvironmentStringsW
CreateMailslotA
EnumDateFormatsW
GetShortPathNameW
SetCalendarInfoA
SetThreadAffinityMask
TerminateJobObject
MoveFileWithProgressW
LocalFileTimeToFileTime
GetLastError
GetVolumeNameForVolumeMountPointA
WideCharToMultiByte
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
LoadLibraryW
CreateFileW
DeleteFileA
gdi32
GetCharABCWidthsW
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fanosez Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ