Static task
static1
Behavioral task
behavioral1
Sample
8cfacf4932f2159a087c0df56d3a4be6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cfacf4932f2159a087c0df56d3a4be6.exe
Resource
win10v2004-20231215-en
General
-
Target
8cfacf4932f2159a087c0df56d3a4be6
-
Size
4KB
-
MD5
8cfacf4932f2159a087c0df56d3a4be6
-
SHA1
f6ef53112213128d0ff504ab202052f394f338ec
-
SHA256
aa2775e0fba7e4ec20dfaac31c749599736cb52baec1a071c97fa55b330c6013
-
SHA512
008bead230dd1a56e0570445f2276e7135292c9a8a86544b66888b736debc72ab59b9ba274b2f0858351df09198b145b5c6777c9dafc70d0f44421ae81662026
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cfacf4932f2159a087c0df56d3a4be6
Files
-
8cfacf4932f2159a087c0df56d3a4be6.exe windows:4 windows x86 arch:x86
a707fca6ac6ff63f912f0231eba66205
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateFileA
CloseHandle
WriteProcessMemory
VirtualProtectEx
VirtualAllocEx
VirtualFreeEx
ReadProcessMemory
GetCurrentProcess
VirtualAlloc
OpenProcess
LoadLibraryA
GetLastError
GetProcessHeap
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
DeleteFileA
GetTempFileNameA
GetTempPathA
GetTickCount
Sleep
CreateProcessA
ExitProcess
lstrlenA
CreateRemoteThread
lstrcpyA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
wininet
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCrackUrlA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE