Static task
static1
Behavioral task
behavioral1
Sample
8b718bec6c57044bc3447c5771579fcbfef67e34e968e3561fa39c2191b79feb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b718bec6c57044bc3447c5771579fcbfef67e34e968e3561fa39c2191b79feb.exe
Resource
win10v2004-20240226-en
General
-
Target
8b718bec6c57044bc3447c5771579fcbfef67e34e968e3561fa39c2191b79feb
-
Size
71KB
-
MD5
5417281a49f1146909b3983ee6998b8d
-
SHA1
cce8416d90ac5def03547cf182506a3bfd009f72
-
SHA256
8b718bec6c57044bc3447c5771579fcbfef67e34e968e3561fa39c2191b79feb
-
SHA512
cdeb5956b818c56a229a348d5af07ec628a1c4d3d67d866f065600d1ac9837a3c73a6275ab9e3ecfbe28922261aa94488eb33132d5891f2994c391aad0514d9a
-
SSDEEP
768:mtlGfs7aFQXcffr36NfxZky2YA/qpwz2nj7sJsAzShkJN/XEKaKPlUMgOPm1FhuL:CG6kQaf2NUm0+j78wvMlUMlP/pI2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b718bec6c57044bc3447c5771579fcbfef67e34e968e3561fa39c2191b79feb
Files
-
8b718bec6c57044bc3447c5771579fcbfef67e34e968e3561fa39c2191b79feb.exe windows:4 windows x64 arch:x64
427d9adcbfac8be53d865e8dcb0bdd6f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapCreate
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
RtlAddFunctionTable
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
__dllonexit
__getmainargs
__initenv
__iob_func
__lconv_init
__mb_cur_max
__set_app_type
__setusermatherr
_acmdln
_amsg_exit
_cexit
_errno
_fmode
_initterm
_lock
_onexit
_strrev
_unlock
abort
calloc
exit
fprintf
fputc
free
fwrite
getc
getenv
islower
isspace
isupper
isxdigit
localeconv
malloc
memcpy
memmove
realloc
signal
strerror
strlen
strncmp
strtol
strtoul
tolower
ungetc
vfprintf
wcslen
user32
EnumWindows
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE