Static task
static1
Behavioral task
behavioral1
Sample
8eb892e18f7108ee94625b5bc3d3add4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8eb892e18f7108ee94625b5bc3d3add4.exe
Resource
win10v2004-20231222-en
General
-
Target
8eb892e18f7108ee94625b5bc3d3add4
-
Size
392KB
-
MD5
8eb892e18f7108ee94625b5bc3d3add4
-
SHA1
ebc91993fd28512dfe8f302368bb6c97625e3114
-
SHA256
45058a1694b0734acda3e0c52d605813d78b88396eec89774be841a7d649eecc
-
SHA512
a9ce8ccf4d6c3722256cbf62099fcf6fd01646b57739d30b8b968215a4414e54549657d2ceb5bc5bdd10da803fac99e93d48dfdd7d5f1f9f5998a709d037d5c2
-
SSDEEP
6144:blEP41wG0fljKQIZhzc7HVHtf5vuyh+ajZCsuAMXMzFHCD/yr07oAH4rLKk0WNh:bR/ApUvsfRh+ajZCBAMXoUK0VHmKk0Ch
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8eb892e18f7108ee94625b5bc3d3add4
Files
-
8eb892e18f7108ee94625b5bc3d3add4.exe windows:4 windows x86 arch:x86
44b3054ee0baecb39f0ed7c33c667278
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
GetModuleHandleA
SetConsoleCursorInfo
UnmapViewOfFile
FindClose
ReleaseMutex
GlobalFree
ExitThread
CreateMutexA
TlsGetValue
HeapDestroy
GetLastError
FindResourceA
GetEnvironmentVariableA
GetProcessHeap
CreateFileA
GetACP
LoadLibraryExW
HeapCreate
SetLastError
user32
DefWindowProcW
GetDC
GetIconInfo
DrawMenuBar
DispatchMessageA
GetDlgItem
FillRect
CopyRect
GetFocus
CallWindowProcA
CheckRadioButton
IsWindow
DrawEdge
uxtheme
GetThemeSysInt
DrawThemeIcon
DrawThemeText
DrawThemeEdge
GetThemeRect
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ