Static task
static1
Behavioral task
behavioral1
Sample
8c1df1ac2108f595f2d84406c0455c3c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c1df1ac2108f595f2d84406c0455c3c.exe
Resource
win10v2004-20231222-en
General
-
Target
8c1df1ac2108f595f2d84406c0455c3c
-
Size
424KB
-
MD5
8c1df1ac2108f595f2d84406c0455c3c
-
SHA1
9886574fb080b6a43556cb81134fb2df13e0aaf0
-
SHA256
9d7476601c751cdc945813fed1492371fad121fa832b5e365f93d508a64c75c4
-
SHA512
d1f83c2440ae730e15a5e9f98b3dbee210b58ae494b313963a5ea86786db7fe15fbce9308f30260091aaa12cd356b9355fd742f3afb94acaef96e7d113c45958
-
SSDEEP
6144:lHjpcEVqCrlv5Z7f4xYv/BFtO+VWjWfVadOuhhvjsUogk/yAr4UGbchQ/9cMV2Yn:lDpcEXrVDfmM/ByWVqOu3Y43AEpbSyr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c1df1ac2108f595f2d84406c0455c3c
Files
-
8c1df1ac2108f595f2d84406c0455c3c.exe windows:4 windows x86 arch:x86
8fd6f48432efc4a338c6720582db01ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractIconW
ExtractIconExA
ShellExecuteExW
SHFormatDrive
SHFileOperation
SHGetFileInfo
SHBrowseForFolderW
SHBrowseForFolderA
DragQueryFile
SHQueryRecycleBinA
DuplicateIcon
ExtractAssociatedIconW
SHFreeNameMappings
ShellExecuteW
gdi32
AnimatePalette
EnumEnhMetaFile
CreateBrushIndirect
GetMetaFileW
CreateRoundRectRgn
SetAbortProc
GetSystemPaletteEntries
GetLogColorSpaceA
RoundRect
CombineTransform
GetOutlineTextMetricsW
PtInRegion
CreateFontIndirectW
GetTextMetricsA
GetDIBits
GetPixelFormat
GetSystemPaletteUse
RectInRegion
CreateScalableFontResourceA
GetTextMetricsW
AbortPath
GetWorldTransform
CreateRectRgnIndirect
ResetDCW
comdlg32
PrintDlgA
ChooseFontW
ChooseColorW
PageSetupDlgW
LoadAlterBitmap
GetFileTitleW
ReplaceTextA
advapi32
AbortSystemShutdownA
LookupPrivilegeNameW
RegEnumKeyExW
RegEnumKeyW
CryptVerifySignatureW
LookupAccountNameW
RegOpenKeyW
CryptVerifySignatureA
RegSetValueExA
kernel32
ExitProcess
HeapReAlloc
GetModuleFileNameA
GetTickCount
RtlUnwind
IsValidLocale
GetCurrentProcess
HeapDestroy
MultiByteToWideChar
GetStdHandle
GetLastError
GetVersion
QueryPerformanceCounter
TlsFree
TlsGetValue
GetSystemTimeAsFileTime
LeaveCriticalSection
GetEnvironmentStringsW
DeleteCriticalSection
GetProcessShutdownParameters
SetLastError
DeleteFileW
GetCommandLineA
GetCurrentProcessId
FreeEnvironmentStringsW
CreateFileMappingW
GlobalUnlock
GetCurrentThreadId
InitializeCriticalSection
TlsAlloc
LoadLibraryA
GetModuleFileNameW
lstrcpyW
IsBadWritePtr
VirtualFree
SetConsoleTitleW
GetModuleHandleA
DuplicateHandle
HeapCreate
GetFileType
EnumResourceNamesA
SetHandleCount
TlsSetValue
GetConsoleCursorInfo
GetLogicalDrives
EnterCriticalSection
GetEnvironmentStrings
VirtualAlloc
InterlockedExchange
GetVolumeInformationW
FormatMessageA
HeapFree
HeapAlloc
WriteFile
GetTimeFormatW
GetStartupInfoA
FindNextFileW
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
FindFirstFileW
VirtualQuery
GetCurrentThread
FreeEnvironmentStringsA
GetProcAddress
GetCommandLineW
user32
SetSystemCursor
GetMenuStringW
TranslateAcceleratorW
GetClipboardFormatNameW
CreateIcon
DispatchMessageW
EnumPropsW
OemToCharA
MonitorFromPoint
OpenIcon
LoadImageW
DefWindowProcW
WINNLSGetIMEHotkey
GetWindowTextLengthA
CopyAcceleratorTableA
ToUnicodeEx
GetMessageTime
GetPropW
GetWindowPlacement
SetUserObjectInformationA
GetScrollInfo
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 302KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ