Static task
static1
Behavioral task
behavioral1
Sample
8b9054d36016c28001b891436707f0bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b9054d36016c28001b891436707f0bc.exe
Resource
win10v2004-20231222-en
General
-
Target
8b9054d36016c28001b891436707f0bc
-
Size
19KB
-
MD5
8b9054d36016c28001b891436707f0bc
-
SHA1
1a87211d9a6f61d2a6a5b8f10cf9e5282b6f84b1
-
SHA256
22dd74a9395b74c58b606d777f375940f9479da1a5346e1c678bcb4af307b0a6
-
SHA512
b9c2dfd1b1467b1027209cf1b26b6835d02848436ef1f628c01ff3db1369377deaf71da61d42311bd80e95b5596e8757f4ae49b48a5c91536abe16038680629e
-
SSDEEP
384:yU+ZeFVEpYtX2Z3Gpg4oljK3FyVZg7cC3TKtJulnfWjvOeo:mZesp37flIFy3g7cA2t0ln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b9054d36016c28001b891436707f0bc
Files
-
8b9054d36016c28001b891436707f0bc.exe windows:4 windows x86 arch:x86
353dca599327708e1cb971dc01db6dd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
FreeLibrary
GetFileAttributesA
GetTempPathA
lstrcpyA
CloseHandle
lstrcatA
GetProcessHeap
CreateEventA
WriteFile
SetFilePointer
CreateFileA
lstrlenA
GetModuleFileNameA
LoadLibraryA
RtlUnwind
GetModuleHandleA
WaitForSingleObject
ExitProcess
SetEvent
CreateThread
GetVersionExA
ExitThread
GetProcAddress
user32
DestroyWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
ShowWindow
CreateWindowExA
SetThreadDesktop
CreateDesktopA
CharToOemA
wsprintfA
PeekMessageA
advapi32
RegCloseKey
RegCreateKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ