Static task
static1
Behavioral task
behavioral1
Sample
8f453aeaa84a2899a50a10c8ab54cbd3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f453aeaa84a2899a50a10c8ab54cbd3.exe
Resource
win10v2004-20231222-en
General
-
Target
8f453aeaa84a2899a50a10c8ab54cbd3
-
Size
7KB
-
MD5
8f453aeaa84a2899a50a10c8ab54cbd3
-
SHA1
e22823a8c8a7590b9dcf9689593b1996bc096a09
-
SHA256
d4af145f150d6bd5680298dbae8001c2b613655158c6dc0a76dcfbf1a42ae88e
-
SHA512
31ffd5c12563dd62f42b3ab377ed52a253c71cf6c813ae7e06ffa43c061cf587731393e8835d9fea84f88fea7879bb249bdd67dd98516ceb332b388b12be77cd
-
SSDEEP
192:zMSsKlBHH8yGwovKSGf+CB0jryRxIV+/v8i:4SLn8ySKinrsIV+v9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f453aeaa84a2899a50a10c8ab54cbd3
Files
-
8f453aeaa84a2899a50a10c8ab54cbd3.exe windows:4 windows x86 arch:x86
3775a2f74746578626d6751ba259523d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
lstrcatA
WideCharToMultiByte
lstrcpyA
WaitForSingleObject
CloseHandle
GetProcessHeap
GetModuleFileNameW
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
SetEvent
CreateThread
GetProcAddress
ExitThread
CompareStringA
Process32First
CreateToolhelp32Snapshot
RtlUnwind
InterlockedExchange
VirtualQuery
SetFileAttributesA
gdi32
SelectObject
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
user32
DestroyWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE