Static task
static1
Behavioral task
behavioral1
Sample
8dbc964070806c78b621f64847a2c6d530713205b486b96430d7aee7aadb4223.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8dbc964070806c78b621f64847a2c6d530713205b486b96430d7aee7aadb4223.exe
Resource
win10v2004-20230703-en
General
-
Target
8dbc964070806c78b621f64847a2c6d530713205b486b96430d7aee7aadb4223
-
Size
1.3MB
-
MD5
dbb6c86afa942e1a646bd0347ca0f2d5
-
SHA1
a6526b2d2be67d0c304ea47c661487b6ff927cbc
-
SHA256
8dbc964070806c78b621f64847a2c6d530713205b486b96430d7aee7aadb4223
-
SHA512
f5a09298438ecf61da0e0a7a9491905bb0e35dc1b825fba324f7d3d788c02e55099cd727522e59a9b0b874d29f2980469dc85a70d3b621466daba36925b05933
-
SSDEEP
24576:v+KpPkyyN3HrLFwl57hH9rXEvv+4rtZRnq/BGlL5ane5YPVzIvhw5z0f:jm0zjyvTQW75YPVzIw5z0f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dbc964070806c78b621f64847a2c6d530713205b486b96430d7aee7aadb4223
Files
-
8dbc964070806c78b621f64847a2c6d530713205b486b96430d7aee7aadb4223.exe windows x86
51d026745ea7ae719cc639dfff42ba86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetModuleHandleA
FormatMessageW
LocalFree
TlsAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
InterlockedExchange
TlsFree
GetSystemTimeAsFileTime
SetFilePointerEx
SetEndOfFile
TlsGetValue
TlsSetValue
InitializeCriticalSection
OutputDebugStringW
GetSystemTime
GetStdHandle
FindClose
QueryPerformanceCounter
GetCurrentProcessId
FreeLibrary
GlobalMemoryStatus
FlushConsoleInputBuffer
GetFileInformationByHandle
GetFullPathNameW
AreFileApisANSI
PeekNamedPipe
FileTimeToLocalFileTime
SetEnvironmentVariableA
WriteConsoleW
InterlockedIncrement
GetDriveTypeW
FindFirstFileExW
SetStdHandle
FlushFileBuffers
InitializeSListHead
GetThreadTimes
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetConsoleCP
ReadConsoleW
GetOEMCP
IsValidCodePage
HeapSize
LCMapStringW
CompareStringW
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
GetModuleHandleExW
GetTimeZoneInformation
LoadLibraryExW
SetConsoleCtrlHandler
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineW
HeapReAlloc
RtlUnwind
RaiseException
DecodePointer
EncodePointer
GetStringTypeW
GetCurrentThread
InitializeCriticalSectionAndSpinCount
FileTimeToSystemTime
InterlockedDecrement
SystemTimeToFileTime
GetFileType
GetCurrentProcess
ReadFile
CreateFileW
WriteFile
ExitProcess
GetCurrentDirectoryW
GetTickCount
GetACP
Sleep
GetProcessHeap
HeapFree
HeapAlloc
SetLastError
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
TerminateProcess
GetLastError
CloseHandle
SystemTimeToTzSpecificLocalTime
user32
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
advapi32
DeregisterEventSource
RegisterEventSourceA
ReportEventA
ws2_32
send
recv
shutdown
WSAGetLastError
closesocket
WSASetLastError
WSACleanup
WSAStartup
Sections
.text Size: 872KB - Virtual size: 872KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 302KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ