Static task
static1
Behavioral task
behavioral1
Sample
8d8c74465fdd23d5dde806d5bedae1c2366c4c8c841068919299f0ff499b5830.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8d8c74465fdd23d5dde806d5bedae1c2366c4c8c841068919299f0ff499b5830.exe
Resource
win10v2004-20231023-en
General
-
Target
8d8c74465fdd23d5dde806d5bedae1c2366c4c8c841068919299f0ff499b5830
-
Size
765KB
-
MD5
868e7ac079bd0f7ff6ae47855cd0b7d2
-
SHA1
4e22681f8436743a3b61f0f61ac0ceaac27e83f3
-
SHA256
8d8c74465fdd23d5dde806d5bedae1c2366c4c8c841068919299f0ff499b5830
-
SHA512
8af6c53cccb5fb221b5eeb040f8a165e63ea3aa3e9ca79823da6d4de7ec78a1c428ca292883596193dfff6f54dd8d25095ced1d4d6a315b20bfc51655805b3ce
-
SSDEEP
12288:h6LJpLMY7UDdLaHy/9j6HYN7ZQpwBGKCfbes2p06ZVo2obLqxyQm98e31qjzAsJ5:OJpLMY7UxLa0e4N7mpeXp06Zy2o2peFL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d8c74465fdd23d5dde806d5bedae1c2366c4c8c841068919299f0ff499b5830
Files
-
8d8c74465fdd23d5dde806d5bedae1c2366c4c8c841068919299f0ff499b5830.exe windows:6 windows x86
09171353915e04e1ffc9e14f6a288c14
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
EqualSid
AllocateAndInitializeSid
CopySid
GetLengthSid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
GetUserNameA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
user32
SendMessageA
GetCursorPos
GetForegroundWindow
GetCapture
GetQueueStatus
GetClipboardOwner
FindWindowA
kernel32
SetEndOfFile
HeapSize
GetTimeZoneInformation
CreateFileW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetStdHandle
GetFileType
CloseHandle
GetCurrentThreadId
FormatMessageA
GetConsoleMode
SetConsoleMode
ReadFile
WriteFile
GetLastError
GetOverlappedResult
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEvent
WaitForSingleObject
CreateEventA
CreateThread
WaitForMultipleObjects
GetTickCount
FindClose
FindFirstFileA
FindNextFileA
QueryPerformanceCounter
GetProcessTimes
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetThreadTimes
GetSystemTimeAsFileTime
GetWindowsDirectoryA
GetProcAddress
GlobalMemoryStatus
LocalFileTimeToFileTime
FreeLibrary
LoadLibraryExA
ReleaseMutex
MapViewOfFile
UnmapViewOfFile
LocalAlloc
LocalFree
CreateFileMappingA
CreateFileA
ClearCommBreak
GetCommState
SetCommBreak
SetCommState
SetCommTimeouts
GetEnvironmentVariableA
DeleteFileA
SetHandleInformation
CreatePipe
CreateProcessA
WaitNamedPipeA
ConnectNamedPipe
CreateNamedPipeA
OpenProcess
LoadLibraryA
GetLocalTime
CreateMutexA
GetSystemDirectoryA
MultiByteToWideChar
WideCharToMultiByte
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
SetLastError
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
WriteConsoleW
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
OutputDebugStringW
FlushFileBuffers
GetConsoleOutputCP
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
GetStringTypeW
FindFirstFileExW
FindNextFileW
IsValidCodePage
DecodePointer
Sections
.text Size: 566KB - Virtual size: 566KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ