Static task
static1
Behavioral task
behavioral1
Sample
8a3ac90a77e4a0509d972b62de9f5c69e11c018870daec9d9414059dc79b370d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8a3ac90a77e4a0509d972b62de9f5c69e11c018870daec9d9414059dc79b370d.exe
Resource
win10v2004-20230703-en
General
-
Target
8a3ac90a77e4a0509d972b62de9f5c69e11c018870daec9d9414059dc79b370d
-
Size
471KB
-
MD5
9af2b12881b089f55bb51dd42a346426
-
SHA1
294f44578ff59b9802aedc580fd921ead9b1e8ee
-
SHA256
8a3ac90a77e4a0509d972b62de9f5c69e11c018870daec9d9414059dc79b370d
-
SHA512
4aa98f006582f00d0a69989b49604c1246937779bada44cc6a4175a652d19526def172fb76c598f4518535def48e5b95d76b354cc62e0ee42d6296298b8ef662
-
SSDEEP
12288:4FtvNtKajM3LxmamAAAv6FCQvtNGhzmu8DLnGv8YsKhaVGoFWoD77eALu9a04M1z:iymu8XGv8YsKgVD7vLux4E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a3ac90a77e4a0509d972b62de9f5c69e11c018870daec9d9414059dc79b370d
Files
-
8a3ac90a77e4a0509d972b62de9f5c69e11c018870daec9d9414059dc79b370d.exe windows x86
02f2acc558cd070ce7bd6367f158b5e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetFileAttributesExA
VerifyVersionInfoA
FindFirstFileExA
FindNextFileA
FindClose
GetLastError
GetFileAttributesA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
VerSetConditionMask
GetConsoleScreenBufferInfo
GetStdHandle
SetConsoleMode
GetConsoleMode
WriteConsoleOutputA
QueryPerformanceFrequency
QueryPerformanceCounter
ReadFile
QueryInformationJobObject
SetHandleInformation
GetSystemTimes
GetLogicalProcessorInformationEx
CreateFileA
CloseHandle
GetActiveProcessorCount
LocalFree
ExitProcess
FormatMessageA
SetConsoleCtrlHandler
CreateNamedPipeA
GetCurrentProcess
GetProcessId
GetQueuedCompletionStatus
WaitForSingleObject
DuplicateHandle
PostQueuedCompletionStatus
GetOverlappedResult
GetCurrentProcessId
CreateProcessA
CreateIoCompletionPort
GenerateConsoleCtrlEvent
ConnectNamedPipe
GetExitCodeProcess
GetFullPathNameA
CreatePipe
GetCommandLineA
GetCurrentThreadId
GetTempPathA
LoadLibraryA
GetProcAddress
ReleaseSemaphore
GetEnvironmentVariableA
OpenSemaphoreA
WaitForSingleObjectEx
CreateThread
QueueUserAPC
CreateSemaphoreA
GetACP
HeapSize
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetStdHandle
GetFileType
CreateFileW
SetEndOfFile
GetModuleHandleExW
SetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetDriveTypeW
GetFullPathNameW
GetModuleFileNameW
WriteFile
GetCommandLineW
SetFilePointerEx
ReadConsoleW
FlushFileBuffers
GetConsoleOutputCP
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
DeleteFileW
MoveFileExW
GetFileSizeEx
CreateDirectoryW
HeapReAlloc
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
WriteConsoleW
Sections
.text Size: 366KB - Virtual size: 366KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ