Static task
static1
Behavioral task
behavioral1
Sample
8e48da748147ec9043acdf913d34da6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e48da748147ec9043acdf913d34da6f.exe
Resource
win10v2004-20231215-en
General
-
Target
8e48da748147ec9043acdf913d34da6f
-
Size
236KB
-
MD5
8e48da748147ec9043acdf913d34da6f
-
SHA1
197378278d231717e497d28ea17552dddf25ee85
-
SHA256
7122f4c628a79f2ae3300da1773a3df66d78e54e8eb8f6314c05b9b3441641ab
-
SHA512
d41eb317935a55b29aeb8a2194331f5c96131a23570dbeb7925cf9ed51b918bae5e7660f2e2333c6e53a5915a132d281f79113078b3025fd9acbba52fc90623b
-
SSDEEP
6144:So7rC9F/xfTGh4zY7fOCx4M2JvlQ+2hY:SoiDOwYdF2Jx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e48da748147ec9043acdf913d34da6f
Files
-
8e48da748147ec9043acdf913d34da6f.exe windows:4 windows x86 arch:x86
266467d9a99ec13c5cd75465a0b877e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_endthreadex
_beginthreadex
__CxxFrameHandler
_except_handler3
sprintf
isdigit
calloc
fprintf
printf
perror
_errno
strerror
fflush
sscanf
wcstombs
mbstowcs
wcscpy
memcmp
fputc
wcscat
strtok
_ftol
rand
__p__commode
fwrite
fseek
ftell
malloc
free
exit
strncat
strncmp
atof
strchr
strcat
system
atoi
_memccpy
_itoa
_stricmp
strcpy
fgets
fopen
fread
strcmp
fclose
memmove
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
??0exception@@QAE@ABV0@@Z
_vsnprintf
strlen
strncpy
memset
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
__p__fmode
__set_app_type
_controlfp
srand
_strdup
msvcp60
?_Xran@std@@YAXXZ
?_Xlen@std@@YAXXZ
kernel32
WaitForSingleObject
GetStartupInfoA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetExitCodeThread
ReleaseSemaphore
CreateSemaphoreA
GetCurrentProcessId
SetThreadPriority
RaiseException
TlsSetValue
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
CreateEventA
GetCurrentThreadId
GetCurrentProcess
GetCurrentThread
DuplicateHandle
InterlockedIncrement
GetThreadPriority
EnterCriticalSection
LeaveCriticalSection
ResumeThread
ResetEvent
InterlockedDecrement
TransactNamedPipe
MultiByteToWideChar
GetLastError
GetTempPathA
GetSystemDirectoryA
CopyFileA
GetModuleFileNameA
OpenProcess
GetModuleHandleA
FreeConsole
AllocConsole
GetStdHandle
WriteFile
CreateNamedPipeA
WaitNamedPipeA
CreateFileA
TerminateProcess
CloseHandle
GetTickCount
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
DeleteFileA
CreateProcessA
ExpandEnvironmentStringsA
GetComputerNameA
GetVersionExA
GlobalMemoryStatus
ReadFile
user32
ExitWindowsEx
wsprintfA
advapi32
CreateServiceA
RegSetValueExA
RegQueryValueExA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
OpenServiceA
ControlService
DeleteService
OpenSCManagerA
RegOpenKeyExA
CloseServiceHandle
ChangeServiceConfig2A
RegDeleteValueA
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegCloseKey
shell32
ShellExecuteA
ws2_32
gethostname
sendto
htonl
setsockopt
WSASocketA
ntohl
WSASetLastError
WSAIoctl
getservbyname
shutdown
ntohs
gethostbyaddr
inet_ntoa
gethostbyname
ioctlsocket
getpeername
getsockname
send
connect
WSACleanup
WSAStartup
inet_addr
recv
WSAGetLastError
select
__WSAFDIsSet
accept
bind
listen
closesocket
socket
getsockopt
htons
netapi32
NetUseDel
NetApiBufferFree
NetShareEnum
NetUserEnum
NetScheduleJobAdd
NetRemoteTOD
NetUseAdd
mpr
WNetAddConnection2A
WNetCancelConnection2W
WNetCancelConnection2A
WNetAddConnection2W
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
dnsapi
DnsQuery_A
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wonk Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE