Static task
static1
Behavioral task
behavioral1
Sample
8e83d01866a8b320694107e32809933f79e5858e955e1c5188dd2139c6db7516.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e83d01866a8b320694107e32809933f79e5858e955e1c5188dd2139c6db7516.exe
Resource
win10v2004-20231215-en
General
-
Target
8e83d01866a8b320694107e32809933f79e5858e955e1c5188dd2139c6db7516
-
Size
13.6MB
-
MD5
da5936678228a148ca4e3a1ec1194589
-
SHA1
84e9c15dcf64fc3cc58e8e32bf3ae95d6e58baf2
-
SHA256
8e83d01866a8b320694107e32809933f79e5858e955e1c5188dd2139c6db7516
-
SHA512
79c56abc51916d72bd5198385e31ccc1f349a44d0261081b8b6af2730b9c82ee3b6a1ff34fa0261bbedef68acccf82a034d189da17c029a63d931cca9b9887f7
-
SSDEEP
393216:qPwadE5xiPR87N/rn25MJFjrTuSne6JA:TI82ufjrCq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e83d01866a8b320694107e32809933f79e5858e955e1c5188dd2139c6db7516
Files
-
8e83d01866a8b320694107e32809933f79e5858e955e1c5188dd2139c6db7516.exe windows:5 windows x64 arch:x64
ebe6f3e6188e977edcfd0e804a73c0e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetModuleHandleW
GetLastError
WaitForMultipleObjects
CreateEventW
CloseHandle
SetEvent
ResetEvent
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
SignalObjectAndWait
TerminateThread
Sleep
VirtualAlloc
VirtualFree
OpenProcess
VirtualQueryEx
WaitForSingleObjectEx
CreateWaitableTimerW
SetWaitableTimer
GetVersion
LocalAlloc
LocalFree
GetProcAddress
GlobalMemoryStatus
FreeLibrary
Heap32ListNext
Heap32Next
QueryPerformanceCounter
Heap32First
Heap32ListFirst
GetTickCount
GetSystemTimeAsFileTime
Thread32First
Thread32Next
VirtualUnlock
LoadLibraryA
Process32FirstW
VirtualLock
Module32FirstW
GetSystemInfo
Process32NextW
CreateToolhelp32Snapshot
GetCurrentThreadId
Module32NextW
GetCurrentProcessId
QueryPerformanceFrequency
SetThreadPriority
GetCurrentThread
SystemTimeToFileTime
LocalFileTimeToFileTime
CompareFileTime
GetLocalTime
FileTimeToSystemTime
SetLastError
GetSystemDirectoryW
VerifyVersionInfoW
VerSetConditionMask
GetWindowsDirectoryW
CreateFileW
DeviceIoControl
GetFileInformationByHandle
GetModuleHandleA
GetProcessHeap
HeapFree
HeapAlloc
HeapReAlloc
FindResourceW
SizeofResource
LoadResource
LockResource
FreeResource
OutputDebugStringW
WriteFile
ReadFile
PeekNamedPipe
WaitNamedPipeW
GetCalendarInfoW
GetFileSizeEx
GetNativeSystemInfo
FormatMessageW
FileTimeToLocalFileTime
GetLocaleInfoW
TryEnterCriticalSection
GetTempPathW
RemoveDirectoryW
FindFirstFileW
FindClose
FindNextFileW
GetFileAttributesW
GetCurrentProcess
RegisterWaitForSingleObject
UnregisterWaitEx
FlushFileBuffers
DisconnectNamedPipe
GetOverlappedResult
GetComputerNameW
GetFileAttributesExW
GetFileTime
SetFileTime
ResumeThread
GetCommandLineW
CreateProcessW
ConvertDefaultLocale
GetLogicalDriveStringsW
QueryDosDeviceW
SetThreadAffinityMask
DeleteFileW
GetModuleFileNameW
SetErrorMode
GetStdHandle
GetDriveTypeW
GetVolumeInformationW
GetFileSize
GetModuleHandleExA
SetFileAttributesW
CopyFileW
TerminateProcess
GetNumberFormatW
GetVersionExW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
GetProcessTimes
LoadLibraryW
GlobalAlloc
OpenEventW
AllocConsole
LoadLibraryExW
MultiByteToWideChar
SetUnhandledExceptionFilter
VirtualProtect
VirtualQuery
OpenThread
SuspendThread
GetThreadContext
SetThreadContext
SearchPathW
GetSystemDirectoryA
LoadLibraryExA
DuplicateHandle
CreateSemaphoreW
ReleaseSemaphore
GetEnvironmentVariableW
WideCharToMultiByte
GetSystemWow64DirectoryW
GetSystemTime
GetExitCodeProcess
CreateHardLinkW
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetVolumeInformationA
ExpandEnvironmentStringsW
SetHandleInformation
CreateNamedPipeW
ConnectNamedPipe
GetThreadPriority
GetLongPathNameW
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
MoveFileW
GetCurrentDirectoryW
GetCurrentDirectoryA
GlobalFree
SetEndOfFile
SetFilePointerEx
FormatMessageA
GetFullPathNameW
GetFullPathNameA
CreateFileA
CreateMutexW
HeapCompact
SetFilePointer
MapViewOfFile
UnmapViewOfFile
UnlockFile
LockFile
UnlockFileEx
HeapDestroy
GetFileAttributesA
HeapCreate
HeapValidate
HeapSize
LockFileEx
GetDiskFreeSpaceW
CreateFileMappingA
CreateFileMappingW
GetDiskFreeSpaceA
OutputDebugStringA
GetVersionExA
GetTempPathA
AreFileApisANSI
DeleteFileA
SetNamedPipeHandleState
ExitProcess
GetStringTypeW
EncodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetModuleHandleExW
GetConsoleMode
ReadConsoleInputA
SetConsoleMode
GetACP
RtlUnwindEx
RtlPcToFileHeader
RtlLookupFunctionEntry
GetCPInfo
RtlCaptureContext
RtlVirtualUnwind
UnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
CompareStringW
LCMapStringW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsValidCodePage
GetOEMCP
GetFileType
GetConsoleCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReadConsoleW
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
SetEnvironmentVariableW
SetEnvironmentVariableA
lstrlenA
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 81KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9.3MB - Virtual size: 9.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ