Static task
static1
Behavioral task
behavioral1
Sample
8c0221a00cd0cea264fb6a5aa8193b28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c0221a00cd0cea264fb6a5aa8193b28.exe
Resource
win10v2004-20231215-en
General
-
Target
8c0221a00cd0cea264fb6a5aa8193b28
-
Size
60KB
-
MD5
8c0221a00cd0cea264fb6a5aa8193b28
-
SHA1
9cff4a59a3dd66bc87813e3833b1030760d59a7d
-
SHA256
d6b1f8390369494c29af4fc33bfae96964c313f9a84de8c39576143d4fe3f285
-
SHA512
2c071215949bec6f463c4b6d194903e963f19b8b6dd6c7fd848a2f3798ab339ce9f6ed8e90d1b915bd73d2bf8655aa5f4b52e458a1b4c9de2cc7461ba19469ce
-
SSDEEP
768:9MMZ90SFCgpNFIxm3YMCbQXFnlWoFBdWKsKJLVClUc9hJaBOfYbIcXXEikEOuLlf:9MgDFPWgYMC0BXdzsZU4hSMYXCwle
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c0221a00cd0cea264fb6a5aa8193b28
Files
-
8c0221a00cd0cea264fb6a5aa8193b28.exe windows:4 windows x86 arch:x86
7bed12bbcb5f7e9e7f3ab6490535917d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
HeapSize
SystemTimeToFileTime
GetLocalTime
FileTimeToSystemTime
lstrcatA
lstrcpyA
ReleaseMutex
lstrlenA
GetShortPathNameA
GetTempPathA
MultiByteToWideChar
GetTickCount
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
CreateMutexA
lstrcmpA
GetModuleHandleA
GetCommandLineA
GetLastError
WideCharToMultiByte
LocalFree
CompareFileTime
GlobalFree
GlobalAlloc
GetFileAttributesA
CloseHandle
WriteFile
DeleteFileA
DeleteCriticalSection
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
TerminateProcess
OpenProcess
lstrcmpiA
GetSystemDefaultLCID
GetVolumeInformationA
GetWindowsDirectoryA
GetStdHandle
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
VirtualAlloc
GetCPInfo
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetOEMCP
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
TlsGetValue
TlsSetValue
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
ExitProcess
GetStartupInfoA
SetUnhandledExceptionFilter
VirtualQuery
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
user32
MsgWaitForMultipleObjects
wsprintfA
SendMessageA
CharUpperA
PeekMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
DefWindowProcA
UpdateWindow
advapi32
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantClear
VarBstrCat
SysFreeString
SysAllocStringLen
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE