Static task
static1
Behavioral task
behavioral1
Sample
8fdaafbdd241ff31487c65d47fc50bff8e4ed4dac38fc441b2a108934a75ad66.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8fdaafbdd241ff31487c65d47fc50bff8e4ed4dac38fc441b2a108934a75ad66.exe
Resource
win10v2004-20230703-en
General
-
Target
8fdaafbdd241ff31487c65d47fc50bff8e4ed4dac38fc441b2a108934a75ad66
-
Size
94KB
-
MD5
fbaed6fa442bfee6f5785a3d75fecddc
-
SHA1
69412df3207fa85e978f89741b485c5152b6d568
-
SHA256
8fdaafbdd241ff31487c65d47fc50bff8e4ed4dac38fc441b2a108934a75ad66
-
SHA512
983cd8b25a2094c2c223ef00648ab5a2054321b76e4b66139d36388ddec2945851e27d19c183e7e92b3209742368056608d0698baab67d12aa7762cbcc8dd934
-
SSDEEP
1536:D4QZoOKRNDTqxtqwrwKsNQbUmDps/EXDiX6O+v1UitydNzJEVe7s:3Zo5RhqxtkKsN8DDps/CiX6O+dxydXs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8fdaafbdd241ff31487c65d47fc50bff8e4ed4dac38fc441b2a108934a75ad66
Files
-
8fdaafbdd241ff31487c65d47fc50bff8e4ed4dac38fc441b2a108934a75ad66.exe windows x86
d10943fa2660edb989cef9cc3a2c06dd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc100
ord12531
ord5532
ord2752
ord2973
ord2974
ord3620
ord10360
ord10007
ord11067
ord946
ord3977
ord12868
ord4785
ord4791
ord6678
ord12285
ord9475
ord11627
ord300
ord310
ord1316
ord1479
ord1483
ord2063
ord2626
ord5207
ord13045
ord305
ord5242
ord2611
ord13219
ord12433
ord1982
ord5175
ord5007
ord262
ord979
ord2525
ord4936
ord7317
ord4207
ord4188
ord423
ord895
ord8304
ord11154
ord2417
ord12535
ord5534
ord8137
ord3254
ord2881
ord6835
ord9399
ord888
ord6112
ord9281
ord5098
ord11787
ord11153
ord11184
ord9449
ord7355
ord4078
ord11180
ord11172
ord5238
ord3409
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord4724
ord13767
ord11726
ord7510
ord7584
ord1288
ord3475
ord5875
ord3746
ord7863
ord1012
ord1890
ord1929
ord2187
ord4344
ord1900
ord3390
ord5858
ord5302
ord8228
ord3744
ord10030
ord1210
ord788
ord12865
ord13095
ord7871
ord12962
ord7206
ord2878
ord7349
ord2416
ord14059
ord14061
ord14060
ord14058
ord14062
ord14045
ord13972
ord13973
ord8235
ord11025
ord3395
ord10883
ord13294
ord8070
ord11107
ord6217
ord9994
ord8351
ord2847
ord12644
ord11190
ord11188
ord1496
ord1503
ord1509
ord1507
ord1514
ord4373
ord4410
ord4381
ord4393
ord4389
ord4385
ord4415
ord4406
ord4377
ord4419
ord4398
ord4364
ord4368
ord4401
ord3991
ord13980
ord3984
ord2661
ord13302
ord7074
ord13300
ord6128
ord10672
ord12482
ord5253
ord2338
ord11060
ord3484
ord2945
ord2944
ord2846
ord11103
ord4622
ord4903
ord5095
ord8439
ord4881
ord5123
ord4625
ord4774
ord4606
ord6897
ord6898
ord6888
ord4772
ord7357
ord9286
ord8305
ord5803
ord381
ord13329
ord11297
ord2818
ord13310
ord11274
ord2056
ord6010
ord265
ord2061
ord266
ord4317
ord316
ord1448
ord901
ord4283
ord1313
ord1485
ord1296
ord2088
msvcr100
_amsg_exit
?terminate@@YAXXZ
_onexit
_lock
__dllonexit
_unlock
strstr
fread
memmove_s
memcpy_s
sprintf
fprintf
_splitpath
strtok
atoi
ldiv
_setmbcp
memset
__CxxFrameHandler3
fopen
__getmainargs
_controlfp_s
_invoke_watson
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
fclose
kernel32
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrcpyA
EncodePointer
DecodePointer
InterlockedExchange
Sleep
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
InitializeCriticalSection
user32
DispatchMessageA
PeekMessageA
DrawIcon
CreatePopupMenu
AppendMenuA
GetSubMenu
TranslateMessage
IsIconic
GetClientRect
LoadIconW
GetSystemMetrics
GetCursorPos
SendMessageA
LoadMenuW
EnableWindow
ws2_32
inet_addr
inet_ntoa
WSAStartup
gethostname
gethostbyname
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ