Static task
static1
Behavioral task
behavioral1
Sample
8659ea840fb9b550beaf2ea4645ce75c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8659ea840fb9b550beaf2ea4645ce75c.exe
Resource
win10v2004-20231215-en
General
-
Target
8659ea840fb9b550beaf2ea4645ce75c
-
Size
453KB
-
MD5
8659ea840fb9b550beaf2ea4645ce75c
-
SHA1
5515ec863e485e9fa78e6ed90a8183e16fea0a82
-
SHA256
9de3b3c4a86c2cd72ec80c9baa1bc82a211e8c9e95cef27361f1c07120f076a1
-
SHA512
39f93041304df23316fff35ec16124e45d129ab7cfaf00c79c2cf83515da48ef3b307ae5a42091785b5fccadfff745d7743f9b360062ef80a2d8bc6b0d900d27
-
SSDEEP
12288:Nq0MWpzaKw88AhZandKe+YNOACEj9EMMnMMMMM:DMGa9EZBJYgAfEMMnMMMMM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8659ea840fb9b550beaf2ea4645ce75c
Files
-
8659ea840fb9b550beaf2ea4645ce75c.exe windows:4 windows x86 arch:x86
25a828b87a7c413eb4dc81e0bd4e1702
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlUnwind
crypt32
CryptFindOIDInfo
samlib
SamRemoveMultipleMembersFromAlias
user32
DialogBoxIndirectParamW
DialogBoxParamA
GetParent
GetDlgItem
EndDialog
SetDlgItemTextA
GetWindowRect
DialogBoxIndirectParamA
SetFocus
LoadImageA
GetDC
SendMessageA
LoadStringA
WinHelpA
EnableWindow
ShowWindow
LoadCursorA
LoadBitmapA
GetWindowLongA
SendDlgItemMessageA
SetCursor
GetDlgItemTextA
SendMessageW
SetWindowLongA
ReleaseDC
CreateWindowExW
MessageBeep
GetSysColor
CallMsgFilterA
gdi32
GetTextExtentPointA
GetTextExtentPointW
DeleteObject
GetTextMetricsW
GetTextMetricsA
SelectObject
shell32
ShellExecuteA
shlwapi
StrCatBuffA
wnsprintfA
StrCpyNW
StrCatBuffW
wintrust
WTHelperCertIsSelfSigned
WinVerifyTrust
WTHelperGetProvCertFromChain
WintrustRemoveActionID
WTHelperGetProvSignerFromChain
WintrustAddActionID
kernel32
GetDateFormatA
EnterCriticalSection
SetProcessWorkingSetSize
InitializeCriticalSection
GetCurrentThreadId
GetSystemTimeAsFileTime
GetCurrentProcess
lstrcmpiA
QueryPerformanceCounter
LeaveCriticalSection
lstrlenW
InterlockedCompareExchange
SetUnhandledExceptionFilter
CompareFileTime
VirtualAlloc
DeleteCriticalSection
WinExec
GetProcAddress
UnhandledExceptionFilter
GetCommandLineA
GetCurrentProcessId
FileTimeToSystemTime
HeapAlloc
GetLastError
ExitProcess
HeapReAlloc
GetTickCount
TerminateProcess
Sections
.text Size: 1024B - Virtual size: 964B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 403KB - Virtual size: 936KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE