Static task
static1
Behavioral task
behavioral1
Sample
8c7b3c0f56bd01577c7cfcc8f14ec049.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c7b3c0f56bd01577c7cfcc8f14ec049.exe
Resource
win10v2004-20231222-en
General
-
Target
8c7b3c0f56bd01577c7cfcc8f14ec049
-
Size
92KB
-
MD5
8c7b3c0f56bd01577c7cfcc8f14ec049
-
SHA1
e078403b8a3f7407a580264c4704803561fe2bcc
-
SHA256
8f7cb54a9280a088b4965d80fcd555acaa84c56823c35d647931e283995fb1c7
-
SHA512
905f5b25b1e21f566c3decad65c3ba7702f44e42b4c46e6eb4b5fd0d52727bd9ea3212318239778c65261fc72fc2e24cc3ed9535dff2504e9aefa059d3d2e9e8
-
SSDEEP
1536:KoGe80O4rl1hefJ2tjBAs3hNuo2twm6J8iAH9VQRXCsOYY:KTeDnrlDi2tjBAs3tL78HjQRy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c7b3c0f56bd01577c7cfcc8f14ec049
Files
-
8c7b3c0f56bd01577c7cfcc8f14ec049.exe windows:4 windows x86 arch:x86
4988d7d2ebe599d95d24b833e37d1c4e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
FindClose
WriteProfileSectionA
PeekNamedPipe
EnumUILanguagesA
WriteConsoleOutputCharacterA
SetFilePointer
RtlFillMemory
ClearCommBreak
ReadConsoleOutputCharacterA
VirtualLock
SetErrorMode
GetCommandLineA
GetStartupInfoA
ExitProcess
ntdll
RtlLockHeap
strncat
NtDeleteFile
NtCreateFile
NtWriteFile
Sections
.text Size: 4KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.adata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
WEIJUNLI Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ