Static task
static1
Behavioral task
behavioral1
Sample
1e8f7806f5f74e788e1ce164ff51be5f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e8f7806f5f74e788e1ce164ff51be5f.exe
Resource
win10v2004-20231215-en
General
-
Target
1e8f7806f5f74e788e1ce164ff51be5f
-
Size
87KB
-
MD5
1e8f7806f5f74e788e1ce164ff51be5f
-
SHA1
cb8af371f67e8b59b318ea4fbdbd3f1604ed40eb
-
SHA256
b516541dadeae101763bf1f3839a35f758539a053070461e42bb691e80107793
-
SHA512
ccaa367a94b4bddb875956f305166d4e3cccd5a2784f6f053dbb1a62801202c8a3f2dc47990e8a7f993b583df1228ea359718833680c53ca79d7139f3407f52c
-
SSDEEP
1536:VT85861TKcKMJo5lZYXlSLTwwXdxJixXB7ctuU5jamLOHfaohL/hroea:nwKcKMJohKwMwX/Jg7Opmaq/hsea
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e8f7806f5f74e788e1ce164ff51be5f
Files
-
1e8f7806f5f74e788e1ce164ff51be5f.exe windows:4 windows x86 arch:x86
5bb6c44afa6617912bd4d9d94cfc6c8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord941
ord535
ord3178
ord356
ord2770
ord2781
ord4058
ord3181
ord668
ord540
ord2818
ord939
ord354
ord5186
ord825
ord665
ord6385
ord1979
ord800
ord823
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
rename
_itoa
fclose
fwrite
sprintf
fopen
vsprintf
__CxxFrameHandler
_fcloseall
fprintf
_access
_beginthreadex
free
malloc
_stricmp
_stat
fscanf
atoi
kernel32
GetSystemDirectoryA
GetLocalTime
GetCurrentProcess
CloseHandle
GetLastError
CreateMutexA
HeapAlloc
GetProcessHeap
GetModuleFileNameA
SetFileTime
GetFileTime
CreateFileA
WinExec
CreateDirectoryA
LockResource
GlobalAlloc
LoadResource
SizeofResource
DeleteFileA
SetFileAttributesA
GetStartupInfoA
GetModuleHandleA
Sleep
MoveFileA
ExitProcess
GetFileAttributesA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetDiskFreeSpaceExA
CopyFileA
FindFirstFileA
FindNextFileA
FindClose
DeviceIoControl
ExpandEnvironmentStringsA
SetCurrentDirectoryA
FindResourceA
user32
GetClientRect
BeginPaint
EndDialog
wsprintfA
DrawTextA
EndPaint
PostQuitMessage
DestroyWindow
DialogBoxParamA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DefWindowProcA
advapi32
AdjustTokenPrivileges
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegSaveKeyA
RegOpenKeyA
RegRestoreKeyA
RegDeleteKeyA
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
GetTokenInformation
RegCreateKeyExA
LookupPrivilegeValueA
iphlpapi
GetAdaptersInfo
ws2_32
WSAStartup
gethostbyname
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ