Static task
static1
Behavioral task
behavioral1
Sample
8ed301383bb3e3297b177fae82ada91c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ed301383bb3e3297b177fae82ada91c.exe
Resource
win10v2004-20231215-en
General
-
Target
8ed301383bb3e3297b177fae82ada91c
-
Size
18KB
-
MD5
8ed301383bb3e3297b177fae82ada91c
-
SHA1
426cc880591927f9838fdff768acc7eb8fd20792
-
SHA256
bec7a6ad72f6a3dc828c417c63de9d5904fefd58ecf4ea9bb26a8d063588eb67
-
SHA512
981099f115966ce1238581e5baf7460909423357ef90cd7d1d1e08247ce4f9c4638938fafffba1f259b5792e55f72770e3d8afc8cdd4c0a2e6d27de7bc27325a
-
SSDEEP
384:LQvnA22M8KNmWd8yzdguxWb7zp+fqijAsMbGOkeyXItnb92eJ6iqGERUw:0oZM8Id8yzc7zsfdj5Ok/On52eoZG7w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ed301383bb3e3297b177fae82ada91c
Files
-
8ed301383bb3e3297b177fae82ada91c.exe windows:4 windows x86 arch:x86
d0ce82ba00d2f51a0aca2713ffe33076
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
OpenProcess
lstrcatA
CreateDirectoryA
lstrcmpiA
GetProcAddress
CopyFileA
SetFileAttributesA
VirtualAllocEx
CreateRemoteThread
Process32Next
LocalAlloc
GetModuleFileNameA
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
LocalFree
WriteProcessMemory
DeleteFileA
Process32First
lstrlenA
LoadLibraryA
CreateFileA
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
p4hl5sqt Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
21inykz3 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ