Static task
static1
Behavioral task
behavioral1
Sample
8c5aac6860701bfed2d013b3dd76ba4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c5aac6860701bfed2d013b3dd76ba4f.exe
Resource
win10v2004-20231215-en
General
-
Target
8c5aac6860701bfed2d013b3dd76ba4f
-
Size
78KB
-
MD5
8c5aac6860701bfed2d013b3dd76ba4f
-
SHA1
ac4fbac04248cee4c382425ab2b8fb282762e105
-
SHA256
0ee3580e666b0c35cfaaa02fef541f44507d04d2dd52a9735455284bbce970f4
-
SHA512
296e72ec9509f413d5d87205452b243c6b272525445170ff0a9ff01a6e03b7f7f2a658caa4a76c4a3304d0410ed9b2726e0f675358cb82f11e4705432f623113
-
SSDEEP
1536:PH8W80bDWr2gE2mtRlVpj2xSu3wi0PhEVM44/fmuXp+:P67qgEtRljj2xKBPmVMnQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c5aac6860701bfed2d013b3dd76ba4f
Files
-
8c5aac6860701bfed2d013b3dd76ba4f.exe windows:4 windows x86 arch:x86
af06a99f002a7c0a5dc675d43a57fa54
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrRChrA
StrRStrIW
StrFromTimeIntervalA
UrlEscapeA
SHRegEnumUSKeyA
UrlIsOpaqueA
StrChrIA
StrNCatW
PathRemoveExtensionA
AssocQueryStringByKeyW
UrlCanonicalizeW
PathAddExtensionA
PathSetDlgItemPathW
SHSkipJunction
StrChrA
SHRegDeleteEmptyUSKeyW
PathUndecorateW
PathUnmakeSystemFolderA
StrFormatKBSizeW
UrlUnescapeW
StrStrA
StrRStrIA
PathFindSuffixArrayW
PathCombineA
PathCanonicalizeA
ColorAdjustLuma
UrlIsA
PathParseIconLocationW
SHRegCreateUSKeyA
UrlCompareW
ChrCmpIW
PathGetCharTypeA
wvnsprintfW
StrRetToBufA
SHRegWriteUSValueA
AssocQueryStringA
UrlCreateFromPathA
PathGetArgsW
PathIsRootA
StrCatBuffA
PathIsUNCServerShareW
SHOpenRegStreamW
PathMakePrettyA
StrStrW
PathRelativePathToW
PathFindExtensionA
StrFromTimeIntervalW
PathAppendA
PathRemoveArgsA
UrlCombineA
SHRegQueryInfoUSKeyA
wvnsprintfA
PathCanonicalizeW
SHRegEnumUSValueA
PathUnquoteSpacesA
StrToIntExA
PathCompactPathExW
StrStrIW
SHSetThreadRef
SHOpenRegStream2W
SHRegGetUSValueW
PathIsPrefixW
PathStripToRootW
SHQueryValueExW
PathMakeSystemFolderA
StrFormatByteSize64A
kernel32
GlobalWire
EraseTape
CommConfigDialogA
FlushConsoleInputBuffer
SetUnhandledExceptionFilter
SetCommTimeouts
SetLocaleInfoA
FindResourceExW
LCMapStringA
OutputDebugStringA
SetLocalTime
GetFileAttributesW
GlobalCompact
GetProcessTimes
SetTapePosition
DefineDosDeviceA
GetTempFileNameW
LCMapStringW
LockResource
SetEndOfFile
GetWriteWatch
GetComputerNameA
GlobalLock
ReadConsoleInputA
ExpandEnvironmentStringsA
GetConsoleCursorInfo
ReadConsoleOutputCharacterA
IsDBCSLeadByte
ScrollConsoleScreenBufferW
GetModuleFileNameW
IsBadReadPtr
VirtualProtect
GetSystemDefaultLangID
GetUserDefaultLCID
BackupWrite
GetBinaryTypeA
GetCurrencyFormatW
WaitForSingleObject
SetFileAttributesW
SetConsoleActiveScreenBuffer
GetConsoleOutputCP
FlushViewOfFile
SetSystemTimeAdjustment
SleepEx
SetConsoleOutputCP
OpenMutexA
SetConsoleWindowInfo
EnumCalendarInfoA
ResetEvent
LocalReAlloc
GetPrivateProfileStructW
GetDiskFreeSpaceW
GetTapeStatus
VirtualQuery
GetLogicalDrives
RtlFillMemory
EnumDateFormatsW
FindFirstFileA
SearchPathA
GetWindowsDirectoryA
GetDateFormatA
GetComputerNameW
GetNumberOfConsoleInputEvents
VirtualAlloc
ReadProcessMemory
SetProcessAffinityMask
PeekConsoleInputW
WriteConsoleInputW
LoadLibraryExW
FoldStringA
WaitCommEvent
GetProfileStringA
GetThreadSelectorEntry
VirtualAllocEx
Toolhelp32ReadProcessMemory
CopyFileExA
GlobalDeleteAtom
GetPrivateProfileStringW
lstrlenA
SetTimeZoneInformation
QueryPerformanceFrequency
GetTempPathW
GetDefaultCommConfigW
SetConsoleTitleA
FindFirstFileW
CreateMailslotW
WriteTapemark
OpenSemaphoreA
CopyFileW
OpenProcess
CreateFileMappingW
SetNamedPipeHandleState
SetFileTime
MapViewOfFileEx
user32
SetWindowsHookExA
MsgWaitForMultipleObjects
CharNextExA
DdeNameService
IsCharAlphaNumericW
FlashWindowEx
CharLowerBuffA
ArrangeIconicWindows
DdePostAdvise
ShowCaret
FindWindowA
LoadBitmapA
GetClassNameA
SetWindowPlacement
BringWindowToTop
FlashWindow
SetDebugErrorLevel
DrawStateW
SetUserObjectInformationW
LoadIconW
SetFocus
ToUnicode
SetScrollPos
SetClassLongA
GetTitleBarInfo
CheckMenuRadioItem
SetMenuInfo
CreateIconFromResourceEx
IsDialogMessageA
PostThreadMessageA
ReleaseDC
DdeGetLastError
SetDlgItemTextW
SetPropA
CreateWindowExW
GetWindowRgn
SetMenuItemBitmaps
MonitorFromPoint
GetWindowModuleFileNameA
TranslateAcceleratorA
GetMonitorInfoW
PeekMessageA
MessageBoxW
ScreenToClient
GetWindowModuleFileNameW
GetActiveWindow
DefMDIChildProcA
EnumDisplaySettingsW
EndPaint
OpenDesktopW
DragObject
EqualRect
DrawFrameControl
MessageBoxIndirectW
GetProcessWindowStation
InsertMenuA
LoadAcceleratorsA
ExitWindowsEx
DestroyAcceleratorTable
CreateWindowStationA
SetWindowsHookExW
IsCharAlphaNumericA
GetMenuState
SetWindowsHookA
ValidateRgn
GetDialogBaseUnits
SetWindowContextHelpId
IsClipboardFormatAvailable
GetWindowInfo
advapi32
MapGenericMask
CryptDestroyHash
CryptGetUserKey
CryptSetProviderExW
LookupAccountSidA
CryptCreateHash
BackupEventLogA
CryptEnumProvidersW
ReportEventW
MakeSelfRelativeSD
OpenSCManagerA
AddAce
CryptGenRandom
GetNamedSecurityInfoExA
EqualSid
ReadEventLogA
GetUserNameA
SetSecurityInfoExW
RegLoadKeyW
LogonUserA
StartServiceW
ObjectOpenAuditAlarmW
CryptAcquireContextW
GetAuditedPermissionsFromAclW
RegQueryValueExW
GetSidLengthRequired
GetSidSubAuthority
CryptSignHashA
CryptContextAddRef
GetSecurityDescriptorOwner
CryptSetProvParam
LogonUserW
ConvertSecurityDescriptorToAccessA
InitializeSecurityDescriptor
RegSetValueExA
GetSecurityInfo
RegisterEventSourceW
AccessCheckAndAuditAlarmW
ReportEventA
AllocateLocallyUniqueId
FindFirstFreeAce
RegCreateKeyExW
RegOpenKeyA
CryptSetProviderExA
SetEntriesInAuditListA
GetSecurityDescriptorGroup
RegOpenKeyW
QueryServiceLockStatusW
LookupPrivilegeValueA
GetSidIdentifierAuthority
GetMultipleTrusteeA
PrivilegeCheck
StartServiceCtrlDispatcherW
AddAccessAllowedAce
SetSecurityDescriptorSacl
GetMultipleTrusteeOperationA
GetAccessPermissionsForObjectW
CryptExportKey
SetKernelObjectSecurity
GetAce
GetAuditedPermissionsFromAclA
GetKernelObjectSecurity
GetNamedSecurityInfoA
ConvertAccessToSecurityDescriptorA
RegUnLoadKeyW
ImpersonateSelf
OpenThreadToken
SetEntriesInAuditListW
BuildImpersonateTrusteeA
RegSetKeySecurity
OpenSCManagerW
RegEnumKeyExA
LookupAccountNameW
GetTrusteeTypeA
CryptEncrypt
BuildTrusteeWithNameA
RegQueryInfoKeyW
QueryServiceConfigA
ole32
OleCreateFromData
CoGetInstanceFromFile
OleCreateMenuDescriptor
CoCopyProxy
CreateObjrefMoniker
OleTranslateAccelerator
OleMetafilePictFromIconAndLabel
CoCreateInstanceEx
OpenOrCreateStream
OleCreateEx
CoInitialize
CoCreateGuid
OleGetClipboard
OleConvertOLESTREAMToIStorageEx
CoTaskMemRealloc
OleLoad
CoQueryReleaseObject
CoGetMalloc
OleGetAutoConvert
SetDocumentBitStg
StgCreateDocfile
StringFromGUID2
CoRegisterSurrogate
OleLoadFromStream
IIDFromString
GetHGlobalFromILockBytes
OleCreateFromFileEx
WriteOleStg
StgIsStorageFile
CoUnmarshalInterface
CoMarshalInterface
CoUnmarshalHresult
CoGetStandardMarshal
GetConvertStg
CLSIDFromProgID
CreateDataCache
OleLockRunning
IsEqualGUID
StringFromIID
CoInitializeSecurity
CreateAntiMoniker
GetDocumentBitStg
CoDisconnectObject
CoGetPSClsid
OleIsCurrentClipboard
CoMarshalHresult
CoResumeClassObjects
StgGetIFillLockBytesOnFile
CreateBindCtx
OleCreateFromDataEx
OleCreateLinkToFile
CoIsOle1Class
OleIsRunning
CoFreeAllLibraries
CoRegisterClassObject
CoReleaseServerProcess
CoLoadLibrary
StringFromCLSID
CoMarshalInterThreadInterfaceInStream
OleRegEnumFormatEtc
StgIsStorageILockBytes
GetHGlobalFromStream
CoRevertToSelf
RegisterDragDrop
CoSuspendClassObjects
CoGetClassObject
OleDraw
OleRegEnumVerbs
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE