Static task
static1
Behavioral task
behavioral1
Sample
8a4eddeda8fecb5a816a28f0760ee4d0d8bf23edbda384a5913d631d676c7438.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8a4eddeda8fecb5a816a28f0760ee4d0d8bf23edbda384a5913d631d676c7438.exe
Resource
win10v2004-20231020-en
General
-
Target
8a4eddeda8fecb5a816a28f0760ee4d0d8bf23edbda384a5913d631d676c7438
-
Size
562KB
-
MD5
7e9f2a4b49225f40e3469615f16afd11
-
SHA1
b1fa6db96471298a42f89b1101e534bb6f8740a1
-
SHA256
8a4eddeda8fecb5a816a28f0760ee4d0d8bf23edbda384a5913d631d676c7438
-
SHA512
839ca8f8f370e03eec1e2e3ad06065f7bd11e7c71d69cf805d8bc24a51c7395a050da8726b1ef01cec50ee59e5b6b2fbc1d5888aede800d48489111fbe1de40c
-
SSDEEP
6144:5ONVZBlfQUE9VnhLrQpWlpqE/q1WxYspX0Dp8YDXshtdyodycte1g/D:5uVZBJa9Vh5l81WkDp3DXcy4Z/D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a4eddeda8fecb5a816a28f0760ee4d0d8bf23edbda384a5913d631d676c7438
Files
-
8a4eddeda8fecb5a816a28f0760ee4d0d8bf23edbda384a5913d631d676c7438.exe windows:5 windows x86
ddd94c5d785e017fe1e425231535363d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
SetVolumeLabelA
SetDefaultCommConfigA
FindResourceA
GetModuleHandleExA
GetLocaleInfoA
CommConfigDialogA
FindResourceExW
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
SetComputerNameW
CreateHardLinkA
FreeEnvironmentStringsA
SetTapeParameters
SetThreadUILanguage
GetConsoleAliasesA
GetConsoleAliasesLengthA
ConvertFiberToThread
GetConsoleTitleA
ReadConsoleW
GetCompressedFileSizeW
GetConsoleAliasExesW
WaitNamedPipeW
EnumTimeFormatsA
WriteFile
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
GetConsoleMode
FatalAppExitW
ReadConsoleInputA
DeleteVolumeMountPointW
GetComputerNameA
EnumSystemCodePagesA
SetSystemPowerState
CreateFileW
FindNextVolumeMountPointW
GetStartupInfoW
GetShortPathNameA
GetNamedPipeHandleStateW
FindFirstFileA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
CopyFileA
FreeUserPhysicalPages
FindClose
GetAtomNameA
LocalAlloc
MoveFileA
BuildCommDCBAndTimeoutsW
RemoveDirectoryW
GetCommMask
AddAtomA
HeapWalk
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
GetModuleHandleA
GetStringTypeW
VirtualProtect
QueryPerformanceFrequency
PeekConsoleInputA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
GetWindowsDirectoryW
FindFirstVolumeW
DeleteFileW
ReadConsoleOutputCharacterW
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetFileAttributesA
GetVolumeNameForVolumeMountPointA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
GetCommandLineW
HeapSetInformation
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
IsProcessorFeaturePresent
user32
CharUpperA
CharUpperBuffA
gdi32
GetTextFaceA
winhttp
WinHttpWriteData
Sections
.text Size: 516KB - Virtual size: 516KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zokusi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xis Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ