Static task
static1
Behavioral task
behavioral1
Sample
8940ab4070ca40c1580e35afa70e6893.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8940ab4070ca40c1580e35afa70e6893.exe
Resource
win10v2004-20231215-en
General
-
Target
8940ab4070ca40c1580e35afa70e6893
-
Size
146KB
-
MD5
8940ab4070ca40c1580e35afa70e6893
-
SHA1
938d045e9555fded9e61e4ff56a7bc92b04e4184
-
SHA256
cf2fdfaf4d3c41063c18a03983a6f2f1cf7dac5263b588e643d5970fbb795f55
-
SHA512
2d26e210b013f3aa840dafe63d5d893ff487bbb31fec84ea957e392b2505b4002cf3f5d02fbbf3e9daf0bf6c2d18baf56d04f52bde166bb25ddf78afd4227441
-
SSDEEP
3072:fb5Bk4nDu2Y46E05ZP58DC+N2MsghJvHYG1PQCD+bRWKvtot5p:Ts4y2F0DPuG+FRhpHToYquB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8940ab4070ca40c1580e35afa70e6893
Files
-
8940ab4070ca40c1580e35afa70e6893.exe windows:4 windows x86 arch:x86
a7248259a6f54acb10549e7e368288ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetCurrentProcess
ReadFile
CloseHandle
WaitForSingleObject
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
VirtualProtect
LocalFree
ExitProcess
GetCurrentThread
VirtualAlloc
SetEvent
GetVersionExA
LocalAlloc
ResetEvent
GetCurrentProcessId
CreateEventA
user32
GetActiveWindow
msvcrt
memset
wcslen
wcsncpy
memcpy
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ