d:\pexxz\r
Static task
static1
Behavioral task
behavioral1
Sample
8bf77d0007c8fea67605be28a71ed1c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8bf77d0007c8fea67605be28a71ed1c6.exe
Resource
win10v2004-20231222-en
General
-
Target
8bf77d0007c8fea67605be28a71ed1c6
-
Size
453KB
-
MD5
8bf77d0007c8fea67605be28a71ed1c6
-
SHA1
e3593e62e3ddbc421d368fb791e0983e855f143f
-
SHA256
f75ecfaae93765a2b42b51ba2cb3c3a1874cc6c6356486fd0f389a6e965f1f01
-
SHA512
21a3a43c732e17b25b2ce969c7889d923231f4595280879cbbeaf23c55e485290efdc6cffa001296998678e6b7de134c48adcc91976a8a5998242e758dfe66c3
-
SSDEEP
6144:VVeND7/Z5r0ixaFe5OncSNpkok8V/qaUmS+4qZN7XZbAys8NUYU+Ks53a8/bJWR1:SD7/ZNDscSN2oJy2SA5TaYU+rHwUzaL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bf77d0007c8fea67605be28a71ed1c6
Files
-
8bf77d0007c8fea67605be28a71ed1c6.exe windows:4 windows x86 arch:x86
b97184ee317070c4a61e00e8bb23579c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
InitCommonControlsEx
wininet
FtpGetFileEx
RetrieveUrlCacheEntryFileW
SetUrlCacheHeaderData
IsUrlCacheEntryExpiredA
FindNextUrlCacheEntryW
SetUrlCacheGroupAttributeW
SetUrlCacheConfigInfoA
FindFirstUrlCacheEntryA
kernel32
GetStringTypeW
TerminateProcess
VirtualFreeEx
ReadFile
TlsGetValue
LCMapStringW
SetEnvironmentVariableA
GetStartupInfoA
VirtualProtectEx
ConnectNamedPipe
GetEnvironmentStringsW
LeaveCriticalSection
TlsFree
GetEnvironmentStrings
SetHandleCount
GetOEMCP
VirtualAlloc
FlushFileBuffers
CompareStringA
CompareStringW
SetComputerNameA
GetStringTypeA
GetCPInfo
WritePrivateProfileStructW
VirtualQuery
GetCommandLineA
IsBadWritePtr
RtlUnwind
lstrcpyn
SetFilePointer
SetConsoleActiveScreenBuffer
ExitProcess
ContinueDebugEvent
GetModuleHandleA
CreateFileA
GetLastError
GetExitCodeProcess
AddAtomA
ReadConsoleA
HeapReAlloc
RtlFillMemory
GetCurrentThread
CloseHandle
InterlockedIncrement
RtlMoveMemory
LocalFlags
QueryPerformanceCounter
InterlockedExchange
GetSystemTime
HeapAlloc
VirtualFree
FreeEnvironmentStringsA
CopyFileExA
GetVersion
TlsAlloc
EnterCriticalSection
GetNamedPipeHandleStateA
GetProcAddress
InterlockedDecrement
MultiByteToWideChar
GetCurrentThreadId
GetLocalTime
DeleteCriticalSection
SetLastError
InitializeCriticalSection
GetTimeZoneInformation
HeapDestroy
GetACP
LCMapStringA
GetStdHandle
GetTickCount
GetSystemTimeAsFileTime
GetFileType
ReadFileEx
SetStdHandle
WriteFile
CreateProcessW
WideCharToMultiByte
EnumTimeFormatsA
UnhandledExceptionFilter
TlsSetValue
LoadLibraryA
OpenMutexA
GetFileAttributesA
GetCurrentProcess
GetModuleFileNameA
HeapCreate
HeapFree
GetProfileSectionW
GetCurrentProcessId
FoldStringW
FreeEnvironmentStringsW
CreateMutexA
user32
CreateCaret
GetDC
SetWindowsHookExW
RegisterClassExA
FlashWindowEx
MessageBoxW
CreateWindowExW
ShowWindow
DdeDisconnect
LoadImageW
RegisterClassA
CreateDesktopA
Sections
.text Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ