Static task
static1
Behavioral task
behavioral1
Sample
8dafdb437e6dfd30a991beb5584f8af2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8dafdb437e6dfd30a991beb5584f8af2.exe
Resource
win10v2004-20231215-en
General
-
Target
8dafdb437e6dfd30a991beb5584f8af2
-
Size
376KB
-
MD5
8dafdb437e6dfd30a991beb5584f8af2
-
SHA1
274dc448cba5ed04ece69e1f7858d17ca90942af
-
SHA256
55281d8188c086f74f7d510cc42a3a30a72ff8e71832b1b5bee30a472345ee1c
-
SHA512
98df105e11858fe3c54d412caf7ae6bb5aa31019386adcaee175420b0d91a9cd36f5411c9fb79bebc3bd546669848addcb3554ae2824ef979e609f47ccc06741
-
SSDEEP
6144:ZipJJfApnditg26l+DncQ4UTqWH2yJRMpghCPdV41bhfkp/gdiphgzjbQv:ZirondKUbly70p/uizgjMv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dafdb437e6dfd30a991beb5584f8af2
Files
-
8dafdb437e6dfd30a991beb5584f8af2.exe windows:4 windows x86 arch:x86
96268df801b07691afc4e56ba82142de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GlobalFree
GetPrivateProfileIntW
FormatMessageW
InterlockedIncrement
lstrcpyW
CreateThread
InterlockedDecrement
FreeLibraryAndExitThread
LocalAlloc
LocalFree
CompareStringW
GetSystemDirectoryW
GetOEMCP
lstrlenW
TlsGetValue
TlsSetValue
SetThreadPriority
WaitForSingleObject
GetCurrentThread
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
MoveFileExW
DeleteFileW
CopyFileW
CreateDirectoryW
WideCharToMultiByte
GetCurrentProcess
FreeLibrary
lstrlenA
SizeofResource
VirtualProtect
LoadResource
FindResourceW
LoadLibraryExW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GlobalAlloc
GetProcessHeap
CreateFileW
CloseHandle
GetModuleHandleW
GetCommandLineA
lstrcpynW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetVersionExA
InterlockedExchange
VirtualQuery
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
GetACP
GetCPInfo
HeapAlloc
VirtualAlloc
HeapReAlloc
GetSystemInfo
user32
LoadStringW
SetCursor
MessageBoxW
LoadCursorW
wsprintfW
advapi32
FreeSid
AdjustTokenPrivileges
OpenProcessToken
DuplicateTokenEx
GetSecurityDescriptorControl
EqualSid
OpenThreadToken
SetThreadToken
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegConnectRegistryW
RegDeleteValueW
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
MakeSelfRelativeSD
GetSecurityDescriptorLength
AddAccessAllowedAceEx
ole32
CoCreateInstance
ReleaseStgMedium
CoInitialize
CLSIDFromString
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ