Static task
static1
Behavioral task
behavioral1
Sample
8e543df9c121e581f4d2822575cbf941fb3c4a2a41fcae5ed8fee8a505afc196.exe
Resource
win7-20231129-en
General
-
Target
8e543df9c121e581f4d2822575cbf941fb3c4a2a41fcae5ed8fee8a505afc196
-
Size
3.1MB
-
MD5
e1e9537e06c9c19ff0d79e2e28e6242c
-
SHA1
09611b35621231b3600d2a662b4adacea005dc0a
-
SHA256
8e543df9c121e581f4d2822575cbf941fb3c4a2a41fcae5ed8fee8a505afc196
-
SHA512
d50faa2a27130fbcba2638dc11fd5c470b94e72297520c995fbfc9a28235a45866fa1871aac47987b6281b36a17d3ed7095039a4607f694da477fca4636444e8
-
SSDEEP
49152:U8NtOFSng/q2/1upBe3ytP4VKpHThGZ7aM0KB4JRwTckxs8sLcm81jxj2bN:U8NW/qloC6VKPGhB4Jem81Fj2b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e543df9c121e581f4d2822575cbf941fb3c4a2a41fcae5ed8fee8a505afc196
Files
-
8e543df9c121e581f4d2822575cbf941fb3c4a2a41fcae5ed8fee8a505afc196.exe windows:5 windows x86 arch:x86
d5c73fc3222fb91b5e280f7fdbfe32d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibraryAndExitThread
ExitThread
FileTimeToSystemTime
PeekNamedPipe
CreateWaitableTimerA
ResumeThread
SetWaitableTimer
OpenEventA
WaitForMultipleObjectsEx
AreFileApisANSI
DeviceIoControl
GetFullPathNameW
GetCurrentDirectoryW
LoadLibraryExW
GetProcAddress
FreeLibrary
FormatMessageW
WideCharToMultiByte
MultiByteToWideChar
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
ReleaseSemaphore
LoadLibraryW
GetVersionExW
GetSystemDefaultLangID
GetSystemInfo
GlobalMemoryStatus
WaitForSingleObject
GetModuleFileNameW
GetLongPathNameW
GetTempFileNameW
GetCommandLineW
GetFileAttributesW
FormatMessageA
CreateFileW
ReadFile
WriteFile
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileInformationByHandle
VirtualAlloc
VirtualFree
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetCurrentThread
SetThreadPriority
Sleep
QueryPerformanceFrequency
DuplicateHandle
CreateSemaphoreA
GetModuleHandleA
GetDriveTypeW
GetThreadTimes
SetConsoleCtrlHandler
SetConsoleTextAttribute
GetStdHandle
OutputDebugStringA
ReleaseMutex
OpenEventW
UnmapViewOfFile
MapViewOfFile
TerminateThread
WaitForMultipleObjects
InitializeCriticalSection
CreateMutexW
CreateThread
RtlUnwind
InterlockedPushEntrySList
RaiseException
GetCommandLineA
ExitProcess
GetModuleHandleExW
GetACP
GetFileType
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetTimeZoneInformation
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
OutputDebugStringW
SetStdHandle
HeapSize
GetConsoleCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
GetEnvironmentVariableW
LoadLibraryA
FindFirstFileW
SetConsoleMode
ReadConsoleA
ReadConsoleW
InterlockedDecrement
lstrlenW
InterlockedIncrement
GetExitCodeProcess
DebugBreak
lstrlenA
CreateProcessW
GlobalAlloc
GlobalFree
MulDiv
GetPrivateProfileStringW
WritePrivateProfileStringW
CreateDirectoryW
GetFileAttributesExW
CreateFileMappingW
OpenFileMappingW
TerminateProcess
GetCurrentProcess
HeapFree
LocalFree
GetProcessHeap
HeapAlloc
GetLastError
CreateEventA
CloseHandle
GetTempPathW
SetEvent
user32
GetUserObjectInformationW
MessageBoxW
GetProcessWindowStation
LoadStringW
CharNextW
GetActiveWindow
MoveWindow
GetClientRect
GetWindowRect
MapWindowPoints
GetWindow
GetWindowLongW
SetWindowLongW
GetDC
advapi32
RegOpenKeyExW
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
CryptReleaseContext
CryptGenRandom
QueryServiceStatusEx
SetServiceStatus
CreateServiceW
ChangeServiceConfig2W
DeleteService
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceObjectSecurity
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetServiceObjectSecurity
StartServiceW
ControlService
RegQueryValueExW
RegOpenKeyW
RegSetValueExW
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptAcquireContextW
winmm
timeGetTime
shell32
SHGetSpecialFolderPathW
SHFileOperationW
gdi32
GetDeviceCaps
SetLayout
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
rpcrt4
RpcStringFreeA
UuidToStringA
ws2_32
send
WSACleanup
WSAGetLastError
closesocket
recv
WSASetLastError
ole32
CoCreateGuid
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 898KB - Virtual size: 897KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 636KB - Virtual size: 640KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE