Static task
static1
Behavioral task
behavioral1
Sample
8e0c65aef5ce2765fc28a518f9a9266ca9b5db350e9e9da7dd8440c9774bfda3.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
8e0c65aef5ce2765fc28a518f9a9266ca9b5db350e9e9da7dd8440c9774bfda3.exe
Resource
win10v2004-20231023-en
General
-
Target
8e0c65aef5ce2765fc28a518f9a9266ca9b5db350e9e9da7dd8440c9774bfda3
-
Size
161KB
-
MD5
3f18131f85381e00959f6728593484ae
-
SHA1
865c564f9e1db53ab59e4cfd0095a8e305d7c673
-
SHA256
8e0c65aef5ce2765fc28a518f9a9266ca9b5db350e9e9da7dd8440c9774bfda3
-
SHA512
a2b17a938e4ca80dac8c27f344437a0bc1ab9320302ecda755ad632b5bfcfb8f35c866c090fd941acb248ced44b5176d1cf57446718eb9d03b4f904ad56986c4
-
SSDEEP
3072:5yuZiCL9JKm466gsy3PzEUdlm7CsH/CeOx:5BZiCLT1xEULee
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e0c65aef5ce2765fc28a518f9a9266ca9b5db350e9e9da7dd8440c9774bfda3
Files
-
8e0c65aef5ce2765fc28a518f9a9266ca9b5db350e9e9da7dd8440c9774bfda3.exe windows:5 windows x86
a6c4817310190006f0ebb17aa2cedad1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
comctl32
InitCommonControlsEx
getuname
GetUName
kernel32
DeleteCriticalSection
EnterCriticalSection
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultUILanguage
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryW
QueryPerformanceCounter
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__lconv_init
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_amsg_exit
_cexit
_fmode
_fpreset
_initterm
_iob
_lock
_onexit
_unlock
_wcmdln
abort
calloc
exit
fprintf
free
fwrite
malloc
memmove
memset
signal
strncmp
vfprintf
wcscpy
wcsncpy
gdi32
CreateFontIndirectW
DeleteObject
EnumFontFamiliesExW
GetDeviceCaps
GetGlyphIndicesW
GetObjectW
GetStockObject
GetTextMetricsW
Rectangle
SelectObject
user32
AppendMenuW
BeginPaint
CopyRect
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextW
EnableWindow
EndDialog
EndPaint
GetClientRect
GetDC
GetDlgItem
GetMessageW
GetSystemMenu
GetSystemMetrics
GetUpdateRect
GetWindowLongW
GetWindowRect
GetWindowTextLengthW
GetWindowTextW
InflateRect
IntersectRect
InvalidateRect
LoadCursorW
LoadImageW
LoadStringW
MapWindowPoints
MoveWindow
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
ScrollWindowEx
SendDlgItemMessageW
SendMessageW
SetProcessDefaultLayout
SetScrollPos
SetScrollRange
SetWindowLongW
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassW
UpdateWindow
wsprintfW
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rossym Size: 31KB - Virtual size: 30KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ