Static task
static1
Behavioral task
behavioral1
Sample
8122f04b02f0da0ef2e20b4e9a701f5c0a432c18b8c26edc5bd5bf9eaae74814.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8122f04b02f0da0ef2e20b4e9a701f5c0a432c18b8c26edc5bd5bf9eaae74814.exe
Resource
win10v2004-20231020-en
General
-
Target
8122f04b02f0da0ef2e20b4e9a701f5c0a432c18b8c26edc5bd5bf9eaae74814
-
Size
1.8MB
-
MD5
ea5e6a500447b3060812eacaf60506c0
-
SHA1
a22c0395575e799067c1bc9a81d22033a80c04de
-
SHA256
8122f04b02f0da0ef2e20b4e9a701f5c0a432c18b8c26edc5bd5bf9eaae74814
-
SHA512
6384d8fa38a009dbfb1e70a0fc17550e98538c941548ee1e86ca460fa963c2ffe9b6b88ee736db1056abddf29637357ffdfa77df2da35cef9b415c38199efda3
-
SSDEEP
24576:jWg1jB5SWfwW/ChJINftAgtWDKvH4E8AeX0:jW2jHrNfmgt9AEUk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8122f04b02f0da0ef2e20b4e9a701f5c0a432c18b8c26edc5bd5bf9eaae74814
Files
-
8122f04b02f0da0ef2e20b4e9a701f5c0a432c18b8c26edc5bd5bf9eaae74814.exe windows:6 windows x86
7142adbbf92eb06e484f4bc48466e742
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
GetCurrentProcess
FindResourceExW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
lstrcpynW
lstrlenW
DeleteFileW
GetFileAttributesW
RemoveDirectoryW
SetFileAttributesW
CloseHandle
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
CreateProcessW
GetStartupInfoW
GetPrivateProfileStringW
MoveFileExW
HeapReAlloc
HeapSize
Process32NextW
Module32FirstW
Module32NextW
HeapAlloc
HeapDestroy
SetLastError
FlushFileBuffers
GetFileSizeEx
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
ReadFile
SetEndOfFile
SetStdHandle
HeapQueryInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
Process32FirstW
HeapFree
GetLastError
RaiseException
CreateToolhelp32Snapshot
DecodePointer
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
GetCurrentThread
ExitProcess
GetTimeZoneInformation
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointerEx
CreateFileW
GetSystemInfo
HeapValidate
WriteConsoleW
GetFileType
IsDebuggerPresent
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
LocalFree
GetCurrentProcessId
InitializeCriticalSection
ReleaseMutex
WaitForSingleObject
FormatMessageW
CreateMutexW
MultiByteToWideChar
WideCharToMultiByte
DeviceIoControl
lstrcmpA
lstrcmpiA
GetSystemDirectoryW
CreateFileA
SetEvent
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
InitializeSListHead
VirtualQuery
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
EncodePointer
GetModuleHandleExW
GetStdHandle
user32
UnregisterClassW
LoadIconW
LoadCursorW
EndPaint
BeginPaint
UpdateWindow
TranslateAcceleratorW
LoadAcceleratorsW
EndDialog
DialogBoxParamW
ShowWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
PostQuitMessage
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
LoadStringW
GetWindowThreadProcessId
SetForegroundWindow
GetForegroundWindow
BringWindowToTop
wsprintfW
UnregisterClassA
AttachThreadInput
gdi32
DeleteDC
advapi32
RegOpenKeyExW
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
shell32
SHFileOperationW
ole32
CoSetProxyBlanket
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateGuid
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
shlwapi
PathCombineW
wnsprintfW
StrStrIW
StrToIntExW
SHGetValueA
PathRemoveFileSpecW
PathFileExistsW
SHSetValueA
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
gdiplus
GdiplusShutdown
Sections
.textbss Size: - Virtual size: 632KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 958B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ