Static task
static1
Behavioral task
behavioral1
Sample
1c8acf4746d8497c2ab849fb4f1cd315.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c8acf4746d8497c2ab849fb4f1cd315.exe
Resource
win10v2004-20231215-en
General
-
Target
1c8acf4746d8497c2ab849fb4f1cd315
-
Size
384KB
-
MD5
1c8acf4746d8497c2ab849fb4f1cd315
-
SHA1
e684e25574ddb8d17d80134e6426ca9d1ef9254f
-
SHA256
881ea0e77f594544a27e605d14b3748b655af77b70b90f8fb80cf61cb753a373
-
SHA512
abb089e9409a44c8a23506133f7dddc7b3f82e2ece2a072a9599d4a96258887baf36901ce77102596abb955b133fe2a8e61b64756773ad6039437c8a597470c6
-
SSDEEP
6144:tdHIo5Htr0fpka2ccsvHZURR7gDhrm4Y4vNCVxkCs+9jVP:D1HI/7He7gDtO41CXkCVP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c8acf4746d8497c2ab849fb4f1cd315
Files
-
1c8acf4746d8497c2ab849fb4f1cd315.exe windows:9 windows x86 arch:x86
e447dd2566311be27f241af3ac8448c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
DebugBreak
SetCommTimeouts
HeapQueryInformation
FileTimeToDosDateTime
UnhandledExceptionFilter
GetCurrentProcessId
HeapAlloc
lstrlenA
GetProcAddress
CreateMutexW
SetCurrentDirectoryW
GetLastError
ResetEvent
GetFileAttributesW
QueryPerformanceCounter
VirtualFree
FreeLibrary
VirtualAlloc
GetCommState
LocalFree
lstrcpyW
ExpandEnvironmentStringsW
CloseHandle
LocalAlloc
GetEnvironmentVariableW
GetCurrentDirectoryW
lstrlenW
GetCurrentThreadId
CreateFileW
HeapCreate
GetSystemTimeAsFileTime
FormatMessageA
WideCharToMultiByte
CreateEventW
GetVersion
WaitForSingleObject
GetTickCount
SetFilePointer
GetEnvironmentStringsW
msvcrt
wcsrchr
__p__commode
wcscat
_adjust_fdiv
??3@YAXPAX@Z
wcschr
_initterm
_mbsinc
setlocale
wcsncpy
strtoul
_wcsicmp
__p__fmode
_acmdln
_ftol
_except_handler3
_wcsnicmp
_cexit
_wtoi
ole32
CLSIDFromString
OleUninitialize
CoInitialize
CoTaskMemAlloc
user32
GetSysColor
GetMessageW
SetTimer
SetCursor
DialogBoxParamW
SendMessageA
SystemParametersInfoW
EndDialog
CreateWindowExW
GetWindowRect
GetClientRect
LoadCursorW
LoadStringA
InvalidateRect
EnumThreadWindows
LoadImageW
DefWindowProcW
DispatchMessageW
SendMessageW
SetFocus
SetForegroundWindow
RegisterClassExW
advapi32
LookupAccountSidW
AdjustTokenPrivileges
RegEnumKeyW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
RegOpenKeyExW
shlwapi
StrChrIW
StrCmpW
StrCpyW
PathIsDirectoryW
SHGetValueW
PathIsRootW
StrCpyNW
StrCmpIW
shell32
SHGetMalloc
SHGetFileInfoW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
Sections
.text Size: 242KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 756KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ