Static task
static1
Behavioral task
behavioral1
Sample
8a21da05be0e6ee983e89eae018fc8a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a21da05be0e6ee983e89eae018fc8a9.exe
Resource
win10v2004-20231215-en
General
-
Target
8a21da05be0e6ee983e89eae018fc8a9
-
Size
420KB
-
MD5
8a21da05be0e6ee983e89eae018fc8a9
-
SHA1
1506359636991a33080af807c1e23637640f3411
-
SHA256
eab41dd4e6b723cd3d913ef2d956c0a4d967fd2a452a2b65c1bf67a16bd7044f
-
SHA512
57c70d647dca5cc81b165c638b06ada68fb71d62a6976cad8ba03b18631d09b3f17ca7b746846c10f1ebdf3683053d0274c82ffee7a7b65b5684eabba06689e9
-
SSDEEP
12288:lvj9PC4eAxw/xM9gd4cQTQb+U0FO2Wag8QS4Yws03qr/:5j9PC4eqSxb4cQEbsE5adMsvr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a21da05be0e6ee983e89eae018fc8a9
Files
-
8a21da05be0e6ee983e89eae018fc8a9.exe windows:6 windows x86 arch:x86
36ccc34b74479708997cf9f7a419ae31
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__wgetmainargs
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
memcpy
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_cexit
api-ms-win-core-processthreads-l1-1-0
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
OpenProcessToken
GetCurrentThreadId
kernel32
LeaveCriticalSection
EnterCriticalSection
DelayLoadFailureHook
GetProcAddress
GetLastError
FreeLibrary
InterlockedCompareExchange
LoadLibraryExA
InterlockedExchange
Sleep
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
UnhandledExceptionFilter
DeactivateActCtx
LoadLibraryExW
ActivateActCtx
ReleaseSRWLockShared
lstrcmpW
AcquireSRWLockShared
RegCloseKey
RegOpenKeyExW
HeapSetInformation
lstrcmpiW
InitializeSRWLock
lstrlenW
LCMapStringW
ReleaseSRWLockExclusive
RegQueryValueExW
AcquireSRWLockExclusive
ReleaseActCtx
CreateActCtxW
ExpandEnvironmentStringsW
GetCommandLineW
ExitProcess
SetProcessAffinityUpdateMode
RegDisablePredefinedCacheEx
GetProcessHeap
SetErrorMode
RegisterWaitForSingleObjectEx
LocalAlloc
HeapFree
WideCharToMultiByte
LocalFree
CloseHandle
HeapAlloc
ntdll
RtlAllocateHeap
RtlLengthRequiredSid
RtlSubAuthoritySid
RtlInitializeSid
RtlCopySid
RtlSubAuthorityCountSid
RtlInitializeCriticalSection
RtlSetProcessIsCritical
RtlImageNtHeader
RtlUnhandledExceptionFilter
EtwEventWrite
EtwEventEnabled
EtwEventRegister
RtlFreeHeap
api-ms-win-security-base-l1-1-0
GetTokenInformation
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetLengthSid
InitializeAcl
api-ms-win-service-core-l1-1-0
StartServiceCtrlDispatcherW
SetServiceStatus
api-ms-win-service-winsvc-l1-1-0
RegisterServiceCtrlHandlerW
rpcrt4
RpcMgmtSetServerStackSize
I_RpcMapWin32Status
RpcServerUnregisterIf
RpcMgmtWaitServerListen
RpcMgmtStopServerListening
RpcServerUnregisterIfEx
RpcServerRegisterIf
RpcServerUseProtseqEpW
RpcServerListen
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 400KB - Virtual size: 992KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ