Static task
static1
Behavioral task
behavioral1
Sample
8caf7cb1065e74d814413e7541e76313.exe
Resource
win7-20231215-en
General
-
Target
8caf7cb1065e74d814413e7541e76313
-
Size
193KB
-
MD5
8caf7cb1065e74d814413e7541e76313
-
SHA1
8e3f9cf06f0cecd833a70f4bcb713625b6e93cb1
-
SHA256
86396fc267c5c31f15477988ddaedeec8f387b4ba2bd0924208285f136e35b9a
-
SHA512
f08c79ce8ba5b18a9b54dde3a09fa5f145a351f428f0f1c250478cb3298843f2a22db61c7a489b69fb3da18fb2ae464cd53cee26ab9b279e2e4e093efd53652a
-
SSDEEP
6144:AMogsc4kLSyjes0q6byvfb/5E3MvYJSBc:AMUjYr6qfbBVYJ9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8caf7cb1065e74d814413e7541e76313
Files
-
8caf7cb1065e74d814413e7541e76313.exe windows:4 windows x86 arch:x86
baf4b5d4f0b13284a97c2c5e28553306
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringW
SetEndOfFile
SetFileTime
GetProcessHeap
GetThreadPriority
WritePrivateProfileSectionA
SetProcessWorkingSetSize
GetCurrentDirectoryW
SetConsoleTitleA
CompareStringW
GetTapeParameters
CreateIoCompletionPort
PeekConsoleInputW
MoveFileExA
GetUserDefaultLangID
WriteConsoleOutputCharacterA
SystemTimeToFileTime
IsBadReadPtr
GlobalFindAtomA
VirtualAlloc
GetOEMCP
ReleaseSemaphore
VirtualAllocEx
EnumCalendarInfoW
EnumResourceNamesA
lstrcmpA
GetAtomNameA
SetProcessAffinityMask
GetDriveTypeA
WritePrivateProfileStructA
EnumDateFormatsW
LocalAlloc
GetHandleInformation
GetCommModemStatus
GetNumberFormatW
CopyFileExW
RemoveDirectoryA
FindFirstFileW
CreateDirectoryW
ClearCommBreak
RemoveDirectoryW
ReadDirectoryChangesW
GetStringTypeExW
GetFullPathNameA
ConnectNamedPipe
ReadConsoleA
SetMailslotInfo
VirtualQuery
FileTimeToLocalFileTime
TlsGetValue
GetProfileStringA
LeaveCriticalSection
FlushFileBuffers
LocalSize
GlobalReAlloc
GetProcessTimes
ReadFileScatter
GetCurrentProcess
GetUserDefaultLCID
SetEvent
SearchPathW
EraseTape
_hread
GetEnvironmentVariableW
WaitNamedPipeA
CompareStringA
CreateProcessA
SetFileAttributesA
SetConsoleActiveScreenBuffer
GetFileAttributesExA
WriteProcessMemory
_lread
SetupComm
GetTempFileNameA
ExitProcess
user32
GetKeyNameTextW
GetScrollInfo
GetSystemMetrics
SystemParametersInfoA
GetCaretBlinkTime
GetUserObjectSecurity
DialogBoxIndirectParamW
ShowWindowAsync
PtInRect
TileWindows
TranslateAcceleratorW
AppendMenuW
RegisterClassW
GetNextDlgGroupItem
CreateCursor
SendMessageCallbackW
SetScrollRange
GetDCEx
SetWindowWord
CreateDesktopW
CopyIcon
GetTopWindow
BringWindowToTop
GetDoubleClickTime
CopyImage
SwitchToThisWindow
IsCharAlphaNumericA
gdi32
DeleteDC
GetOutlineTextMetricsA
SetBitmapBits
BeginPath
GetTextCharacterExtra
CreateCompatibleBitmap
GetFontLanguageInfo
PlayEnhMetaFileRecord
GetSystemPaletteEntries
CreateHalftonePalette
GetObjectW
GetTextExtentExPointW
GetTextCharsetInfo
ExtFloodFill
OffsetWindowOrgEx
EnumFontFamiliesExW
comdlg32
ChooseFontA
GetOpenFileNameA
ChooseFontW
advapi32
SetEntriesInAclW
RegDeleteValueA
AllocateLocallyUniqueId
RevertToSelf
CryptGetKeyParam
SetKernelObjectSecurity
StartServiceA
RegConnectRegistryW
InitializeSid
CreateProcessAsUserA
StartServiceCtrlDispatcherA
LookupAccountNameA
OpenEventLogW
GetLengthSid
DeleteAce
GetUserNameA
CryptSignHashW
SetTokenInformation
CryptAcquireContextA
CryptAcquireContextW
CryptVerifySignatureA
RegCreateKeyExW
CryptSetProvParam
CryptEncrypt
AbortSystemShutdownW
RegCreateKeyW
CryptDeriveKey
AllocateAndInitializeSid
RegOpenKeyExA
GetSidSubAuthorityCount
shell32
SHGetSpecialFolderPathW
SHFileOperationA
DragAcceptFiles
ole32
StgSetTimes
oleaut32
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantCopy
SafeArrayRedim
SysAllocStringLen
comctl32
CreateToolbarEx
shlwapi
PathUnquoteSpacesW
UrlCreateFromPathW
SHAutoComplete
StrFormatByteSize64A
PathFindNextComponentW
StrCpyNW
PathIsNetworkPathW
StrPBrkW
StrRChrA
PathRemoveBackslashA
SHSetValueW
PathIsDirectoryA
PathAddBackslashA
PathAddBackslashW
StrRChrW
PathFileExistsW
PathRemoveBackslashW
SHCopyKeyA
StrTrimA
Sections
.text Size: 8KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ