Static task
static1
Behavioral task
behavioral1
Sample
8cafa87b08b901b3004a2426c959cc52.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8cafa87b08b901b3004a2426c959cc52.exe
Resource
win10v2004-20231215-en
General
-
Target
8cafa87b08b901b3004a2426c959cc52
-
Size
45KB
-
MD5
8cafa87b08b901b3004a2426c959cc52
-
SHA1
5980c2e6701fe76771193465f549016495ea6493
-
SHA256
6d810a4c87ca25055e33e4d24a13b99deacbfcb0295d0814e1079e90dabc1ae0
-
SHA512
7dfd826812881b5a9703811eb420b8f45679f0d74820cff56c234ffbb81574fd56c6c5c1941d6e1d601c167d72635390bf9b1937630cfbae0fe45f8596b67fc0
-
SSDEEP
768:7vAx6o7zOWWpQTRqqAkOSexO0TsWYLT690PCpNIi8Qn//rYNPhh9e9FeVKz:7v2WpQvAkP0O0AWYve0qj5nHrYNc5z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cafa87b08b901b3004a2426c959cc52
Files
-
8cafa87b08b901b3004a2426c959cc52.exe windows:4 windows x86 arch:x86
c0d5a15991fbbee70da0f6fdf7e75a36
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
FindAtomA
lstrcmpA
lstrlenA
GetModuleFileNameA
lstrcpynA
CreateMutexA
CloseHandle
GetVersion
GetTickCount
GetTempPathA
GetSystemTime
WriteFile
lstrcpyA
GetCommandLineA
CreateProcessA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
GetVersionExA
RtlUnwind
IsDebuggerPresent
user32
wsprintfA
ClientToScreen
GetCursorPos
GetCaretPos
EqualRect
GetWindowRect
IsWindowVisible
GetFocus
InflateRect
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE