Static task
static1
Behavioral task
behavioral1
Sample
8dba77c32d438280caa7e693c57756b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8dba77c32d438280caa7e693c57756b7.exe
Resource
win10v2004-20231215-en
General
-
Target
8dba77c32d438280caa7e693c57756b7
-
Size
370KB
-
MD5
8dba77c32d438280caa7e693c57756b7
-
SHA1
1cd4ae67dc44ad4596380a6f3888931d3f0b31e7
-
SHA256
8ec39f3a06936f75e30aaa9cce630c0e6b62d8ea6d89b5c274909bc185d8223e
-
SHA512
8b54e3978ed08b9a5a502404460f6a2ca6527fb9765737d1b09f743febbbc3215cc042431026e754423704bee7be1507263b7b348abfab0cbbee20b83b6df617
-
SSDEEP
6144:N7NJcGyC2Cy8fumy5UGR6go/pnGSBR0HfYHkImafR7pgXcHBf5NUpY/HzERKK:J552CFumQUGQgoRGM0HfYAkRZd5mW/Hg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dba77c32d438280caa7e693c57756b7
Files
-
8dba77c32d438280caa7e693c57756b7.exe windows:4 windows x86 arch:x86
f37f1cd0c96fa325001c2ac7e30ad7e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
lstrlenA
CloseHandle
CreateFileW
LocalSize
GetMailslotInfo
LocalFree
FindVolumeClose
ReleaseMutex
InterlockedExchange
GetCurrentThreadId
GetPrivateProfileIntW
GetDriveTypeW
GlobalFree
FreeConsole
VirtualAlloc
GetModuleHandleW
ResetEvent
GetExitCodeProcess
ReadFile
user32
IsIconic
DispatchMessageA
CreateWindowExA
GetSysColor
GetDlgItem
SetFocus
GetClientRect
DrawStateW
GetMenu
CallWindowProcW
GetClassInfoA
GetCursorInfo
EndDialog
dsprop
CheckADsError
CheckADsError
ReportError
CheckADsError
CheckADsError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ