Static task
static1
Behavioral task
behavioral1
Sample
8b046f9745b0a0eb146bcb5b301afd23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b046f9745b0a0eb146bcb5b301afd23.exe
Resource
win10v2004-20231215-en
General
-
Target
8b046f9745b0a0eb146bcb5b301afd23
-
Size
463KB
-
MD5
8b046f9745b0a0eb146bcb5b301afd23
-
SHA1
29201c0ff196d4dd31e3e633afbc1018dd5024c8
-
SHA256
54844dae3b2446f931cedfbaaa48dd1593a45a70d30ccb583a25f73d407ddcac
-
SHA512
3712d1d0c725c2f1d1300bc3e20d4f9e5f3f6685f2108371af5f310ce2415b9ccd7f5c111f6a8a61395fe2633678928b6196f100144bc807544448ae87f0eeb7
-
SSDEEP
12288:WRQXBTnP1+XuHR0KcCsHHC+siAdPgm/ydlh:WRQXBTnQXW0Kc1Hi+siwP7/e/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b046f9745b0a0eb146bcb5b301afd23
Files
-
8b046f9745b0a0eb146bcb5b301afd23.exe windows:4 windows x86 arch:x86
71334312f57db44acb0d4a06a4f0e6dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetErrorDlg
InternetCrackUrlA
InternetAutodialHangup
GetUrlCacheEntryInfoW
IsUrlCacheEntryExpiredA
CommitUrlCacheEntryA
comdlg32
GetOpenFileNameW
LoadAlterBitmap
user32
GetMessagePos
SetWindowLongA
TranslateAcceleratorW
SetWindowTextA
DrawStateA
WinHelpW
RegisterClassExA
TrackPopupMenuEx
GrayStringA
GetKeyboardLayoutNameA
RegisterClassA
DrawTextExW
UnionRect
EnumDisplaySettingsExA
InternalGetWindowText
CopyAcceleratorTableA
comctl32
InitCommonControlsEx
kernel32
GetStartupInfoW
GetOEMCP
ExitProcess
InterlockedIncrement
SetStdHandle
GetCurrentThread
EnumSystemCodePagesW
GetDiskFreeSpaceExA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetPrivateProfileStringW
GetTimeZoneInformation
GetTimeFormatA
LoadLibraryW
GetConsoleMode
WriteFile
CompareStringW
GetTickCount
CreateFileA
GetLocaleInfoA
GetNumberFormatW
FreeEnvironmentStringsW
GetModuleFileNameW
GetVolumeInformationA
SetFilePointer
RtlUnwind
VirtualAlloc
lstrcmpi
GetConsoleCP
GetLocaleInfoW
HeapReAlloc
TlsAlloc
InterlockedExchange
lstrcpyW
IsDebuggerPresent
HeapFree
VirtualProtectEx
HeapDestroy
GetCPInfo
UnhandledExceptionFilter
GetCommandLineA
QueryPerformanceCounter
GetCurrentThreadId
OpenSemaphoreW
GetEnvironmentStringsW
CloseHandle
ReadConsoleInputW
GetCommandLineW
WriteConsoleA
VirtualFreeEx
CreateMutexA
HeapAlloc
GetProcAddress
IsValidLocale
GetStartupInfoA
VirtualQuery
LoadLibraryA
ReadFile
FoldStringW
GetFileType
GetModuleFileNameA
GetUserDefaultLCID
LCMapStringW
TlsFree
HeapSize
FreeResource
WriteConsoleW
GetCurrentProcessId
GetACP
IsValidCodePage
SetUnhandledExceptionFilter
GetCurrentProcess
GetDateFormatA
InterlockedDecrement
GetStdHandle
CompareStringA
MultiByteToWideChar
VirtualFree
HeapCreate
SetConsoleTextAttribute
TlsSetValue
SetHandleCount
GetThreadSelectorEntry
GetLastError
GetSystemTimeAsFileTime
GetModuleHandleW
SetEnvironmentVariableA
GetStringTypeW
GetModuleHandleA
WideCharToMultiByte
SetLastError
TlsGetValue
GetEnvironmentStrings
GetAtomNameW
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
TerminateProcess
GetStringTypeA
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeExA
LCMapStringA
OpenMutexA
Sleep
EnumSystemLocalesA
DeleteCriticalSection
Sections
.text Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ