Static task
static1
Behavioral task
behavioral1
Sample
8e6e4b930b79cb66ece296d8bacc0225db53b48f362508dcc5e335b254055a7f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8e6e4b930b79cb66ece296d8bacc0225db53b48f362508dcc5e335b254055a7f.exe
Resource
win10v2004-20230915-en
General
-
Target
8e6e4b930b79cb66ece296d8bacc0225db53b48f362508dcc5e335b254055a7f
-
Size
301KB
-
MD5
531a942a943d149dd615d07a566cd06b
-
SHA1
3112979189a6922f0090731dd1660299a0416afb
-
SHA256
8e6e4b930b79cb66ece296d8bacc0225db53b48f362508dcc5e335b254055a7f
-
SHA512
034b6db05a0805eacb26e18b6151fccf19496d9f7e48b23d235ee7fc3c30f9c9bb13fd4281f74c008d41da14b4e26a9efca674a1a5e74488733e16b83d058c3b
-
SSDEEP
3072:KoF324VAoovHMp7WCC75csFtCDLpaD49uJbyeO8J:pGnoovH07h6cg8LpU49WI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e6e4b930b79cb66ece296d8bacc0225db53b48f362508dcc5e335b254055a7f
Files
-
8e6e4b930b79cb66ece296d8bacc0225db53b48f362508dcc5e335b254055a7f.exe windows:5 windows x86
04c2204ccf7af76dc6a24e22c76c351e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetDriveTypeW
BuildCommDCBAndTimeoutsA
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
MoveFileExW
InterlockedDecrement
CreateJobObjectW
SetHandleInformation
GetProfileStringW
AddConsoleAliasW
SetVolumeMountPointW
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasExesW
EnumTimeFormatsA
EnumTimeFormatsW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
TerminateThread
FatalAppExitW
GetStartupInfoW
CreateMailslotW
RaiseException
GetPrivateProfileIntW
InterlockedExchange
SetLocaleInfoA
SetThreadLocale
GetLastError
GetCurrentDirectoryW
BackupRead
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
OpenMutexA
GetProcessId
LocalAlloc
GetNumberFormatW
GlobalGetAtomNameW
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
VirtualProtect
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
OpenSemaphoreW
FindAtomW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DeleteFileW
CreateFileW
ReadFile
FlushFileBuffers
FindFirstFileW
SetDefaultCommConfigA
GetCommandLineW
GetFileSize
GetComputerNameA
GetStartupInfoA
WriteConsoleW
SetStdHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DeleteFileA
HeapSetInformation
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleMode
HeapReAlloc
LCMapStringW
CloseHandle
user32
GetComboBoxInfo
CharUpperW
gdi32
SelectPalette
GetTextFaceW
GetBoundsRect
advapi32
LookupAccountSidW
shell32
DragFinish
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ