Static task
static1
Behavioral task
behavioral1
Sample
8c67e437b58a44d7a5db04a130245e807da9136af0092a3b30df54d70c2182f8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8c67e437b58a44d7a5db04a130245e807da9136af0092a3b30df54d70c2182f8.exe
Resource
win10v2004-20230915-en
General
-
Target
8c67e437b58a44d7a5db04a130245e807da9136af0092a3b30df54d70c2182f8
-
Size
112KB
-
MD5
9d97932c58b88f9c67a853ccfc0a5863
-
SHA1
aee3f23d2759e75c706b004a6cee5914cceb89ff
-
SHA256
8c67e437b58a44d7a5db04a130245e807da9136af0092a3b30df54d70c2182f8
-
SHA512
28557e81fe2193cd7072a51c64a2fb30fc3645f0a8ffc93021d2cb6fe3658385c91eccac4938c87bc7fc0e5ef99d57247d5743246e29b546ddc78d5317f31373
-
SSDEEP
3072:/J/G1Q/OosTqF/pstBaDqwONnct437Bl3N2UY:/J/CXeF/p/uwONct43j92U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c67e437b58a44d7a5db04a130245e807da9136af0092a3b30df54d70c2182f8
Files
-
8c67e437b58a44d7a5db04a130245e807da9136af0092a3b30df54d70c2182f8.exe windows:6 windows x64
821823edfdf87dd2671c35bd0265136e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mfc140u
ord1121
ord3952
ord6090
ord6287
ord8901
ord8926
ord11855
ord2697
ord13397
ord6000
ord3071
ord3307
ord3308
ord11085
ord10704
ord8731
ord11813
ord7394
ord6569
ord1748
ord961
ord1427
ord13577
ord6648
ord4946
ord12240
ord13770
ord486
ord14227
ord2801
ord8441
ord4086
ord6361
ord3803
ord2479
ord1722
ord1700
ord11940
ord11944
ord13513
ord3173
ord8947
ord10691
ord6729
ord11902
ord8656
ord14209
ord11625
ord3718
ord11771
ord8830
ord11415
ord11414
ord5451
ord9979
ord9975
ord9977
ord9978
ord9976
ord14360
ord2698
ord7913
ord3209
ord489
ord13401
ord6002
ord450
ord8167
ord8084
ord12544
ord8023
ord5183
ord14211
ord12222
ord286
ord14210
ord7650
ord14216
ord9089
ord4011
ord3949
ord5676
ord7668
ord2011
ord11664
ord11665
ord14088
ord12212
ord7719
ord14288
ord6121
ord14290
ord6123
ord14289
ord6122
ord3731
ord5706
ord11921
ord11929
ord4445
ord7920
ord10124
ord11933
ord11901
ord12606
ord5080
ord5363
ord5552
ord9041
ord5339
ord5555
ord5083
ord5229
ord5062
ord7460
ord7461
ord7450
ord5227
ord7922
ord9941
ord8900
ord6614
ord1091
ord6250
ord6320
ord3756
ord296
ord1033
ord4656
ord2270
ord1089
ord3212
ord7551
ord1111
ord3951
ord2238
ord13545
ord7054
ord13109
ord2967
ord4352
ord9384
ord940
ord2178
ord7716
ord1450
ord983
ord7393
ord10070
ord265
ord266
ord1489
ord11644
ord12223
ord4360
ord4828
ord4767
ord4752
ord1120
ord4814
ord4859
ord4782
ord488
ord4837
ord10727
ord1369
ord4853
ord4794
ord878
ord13767
ord4800
ord10163
ord7235
ord3599
ord2212
ord2187
ord990
ord6303
ord9946
ord5916
ord5582
ord4806
ord4788
ord11850
ord3172
ord3278
ord3279
ord3812
ord11806
ord2629
ord5723
ord13354
ord11406
ord6631
ord14217
ord12033
ord4843
ord4776
ord12625
ord1755
ord7651
ord2439
ord1734
ord2370
ord1402
ord1491
kernel32
MultiByteToWideChar
GetLastError
lstrcpynW
LoadLibraryW
GetProcAddress
FreeLibrary
GetModuleFileNameW
OpenProcess
GetModuleHandleW
CloseHandle
OutputDebugStringW
lstrlenW
IsProcessorFeaturePresent
VirtualAllocEx
WriteProcessMemory
WaitForSingleObject
VirtualFreeEx
CreateProcessW
FormatMessageW
LocalFree
InitializeCriticalSectionEx
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
CreateEventW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetLocalTime
DeleteCriticalSection
user32
EnableWindow
LoadIconW
SendMessageW
IsIconic
GetSystemMetrics
GetClientRect
PostMessageW
ClientToScreen
CreatePopupMenu
AppendMenuW
TrackPopupMenu
DrawIcon
comctl32
InitCommonControlsEx
msvcp140
?_Xout_of_range@std@@YAXPEBD@Z
?_Xbad_alloc@std@@YAXXZ
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140
__std_terminate
memmove
memset
__C_specific_handler
__CxxFrameHandler3
__telemetry_main_invoke_trigger
__telemetry_main_return_trigger
__vcrt_InitializeCriticalSectionEx
_CxxThrowException
memcpy
memcmp
api-ms-win-crt-stdio-l1-1-0
__p__commode
__stdio_common_vswprintf_s
_set_fmode
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
malloc
api-ms-win-crt-string-l1-1-0
wcscpy_s
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
setlocale
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
terminate
_crt_atexit
_register_onexit_function
_initialize_onexit_table
_seh_filter_exe
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
_set_app_type
_exit
exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
api-ms-win-crt-filesystem-l1-1-0
_wmkdir
_waccess
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 916B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ