Static task
static1
Behavioral task
behavioral1
Sample
8eac0dfb29d7789dbf8bafb33f8b55f5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8eac0dfb29d7789dbf8bafb33f8b55f5.exe
Resource
win10v2004-20231222-en
General
-
Target
8eac0dfb29d7789dbf8bafb33f8b55f5
-
Size
76KB
-
MD5
8eac0dfb29d7789dbf8bafb33f8b55f5
-
SHA1
60b11941682f56dfdc29915dac1beb8772f409c4
-
SHA256
86397715d984c161a37f85b6563600620a29381bd10656e6cae779b4f8d17233
-
SHA512
72912f141d88b0045435086f1b3703d6053955ffa57dec0e67cfbaa2a8f722d3554c6411ceda525c1c5826f06203bb131c4e9935030ed67910bb8f313c382726
-
SSDEEP
1536:Fp5bB9oNlRpFNT2UnCkjayx9LivTysPxJ:FwRpFNTokjZxETysPxJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8eac0dfb29d7789dbf8bafb33f8b55f5
Files
-
8eac0dfb29d7789dbf8bafb33f8b55f5.exe windows:4 windows x86 arch:x86
23fe81b72c4929f6d3b2148eff95709a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
OpenProcess
CreateRemoteThread
Process32First
CreateToolhelp32Snapshot
FormatMessageA
GetLastError
CloseHandle
GetSystemDirectoryA
SetFileAttributesA
Process32Next
GetVersion
CompareStringW
CompareStringA
GetTimeZoneInformation
GetCurrentDirectoryA
GetFullPathNameA
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
IsBadWritePtr
SetFilePointer
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
RaiseException
SetEnvironmentVariableA
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
shell32
ShellExecuteExA
shlwapi
StrStrIA
urlmon
URLDownloadToFileA
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE