Static task
static1
Behavioral task
behavioral1
Sample
8e264a68d85871f6883f9052be6d60f3.exe
Resource
win7-20231215-en
General
-
Target
8e264a68d85871f6883f9052be6d60f3
-
Size
320KB
-
MD5
8e264a68d85871f6883f9052be6d60f3
-
SHA1
4368b053ddee049c7565cb36b84afe5c7ffb8661
-
SHA256
803290f199a42e7301b0520e72284df6de45d200d0ab3a5a2c6f3590285302b7
-
SHA512
5a7199389907afa3e2c3606e89b081768d3e16f04ea876861f0cfc252a300fb3cf783fe57e811a483b2d8437763e83c2f789422f1643736ce347c9ea69c1a229
-
SSDEEP
6144:CwvJ2yX4BhdLCYWY/uuogFe6Sj1O+WQ5BaAf9Eo/w80Ktb03JblI/4sr:dx2BTLzm6wOs5BPf9SXKyItr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e264a68d85871f6883f9052be6d60f3
Files
-
8e264a68d85871f6883f9052be6d60f3.exe windows:4 windows x86 arch:x86
e304217fc16c011615a0ec22783cbfae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 263KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 44KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE