Static task
static1
Behavioral task
behavioral1
Sample
be8e7c58e4e37f5e80e7342c5a575c2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be8e7c58e4e37f5e80e7342c5a575c2f.exe
Resource
win10v2004-20240226-en
General
-
Target
be8e7c58e4e37f5e80e7342c5a575c2f
-
Size
178KB
-
MD5
be8e7c58e4e37f5e80e7342c5a575c2f
-
SHA1
8c8f1f894f5655629247fcb3049a828b5134a99d
-
SHA256
97382cc142a1b6cb82ef88275b81b740ac1a5c80d4b2d342e2f2908a6a5f6ee8
-
SHA512
4352b90862c9db8acf61a928b80423a25af7fa910e098661e1bd4b3a46b8a64bb1625ed68746ecf088680f86909a1ee05da2a34db3ce763b48d190665f65a6f9
-
SSDEEP
3072:eonuYvXjJeB7gjYcLYTJcd8v0j5s/HBrm36UCijMZ2BSj:eBM67D4YTJcd8Gs/HB/5ijM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be8e7c58e4e37f5e80e7342c5a575c2f
Files
-
be8e7c58e4e37f5e80e7342c5a575c2f.exe windows:1 windows x86 arch:x86
700cff6f4c438bfaf266bff3e52c07b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseSemaphore
GetEnvironmentVariableA
ReadConsoleA
GetConsoleCursorInfo
MapViewOfFile
HeapDestroy
SetFirmwareEnvironmentVariableA
GetDllDirectoryA
_lwrite
GetModuleHandleA
TerminateProcess
GetVolumePathNameA
CreateDirectoryA
GetLastError
SetThreadLocale
SetDefaultCommConfigA
EnumTimeFormatsA
GetCommandLineA
GetLocalTime
IsBadCodePtr
SetProcessPriorityBoost
GetConsoleWindow
ReadConsoleA
SetTimerQueueTimer
WriteConsoleOutputCharacterW
TerminateThread
UpdateResourceA
SearchPathA
PeekConsoleInputA
ReleaseMutex
LoadResource
GetProcessHeaps
GetDefaultCommConfigA
GetCommMask
Thread32First
WriteConsoleInputA
FlushInstructionCache
UnregisterWaitEx
VirtualQueryEx
GetThreadTimes
GetStringTypeExW
VirtualFreeEx
GetAtomNameA
PeekNamedPipe
GetConsoleTitleA
FindNextVolumeA
GetCurrentThreadId
RegisterWaitForSingleObjectEx
lstrcmp
VirtualAllocEx
IsBadStringPtrA
VirtualAlloc
FatalAppExitW
GetCurrentConsoleFont
SetFilePointerEx
WriteFileGather
ReadConsoleA
_lopen
SetInformationJobObject
SetConsoleInputExeNameA
IsDebuggerPresent
GetConsoleCursorMode
GetWindowsDirectoryA
WriteConsoleOutputCharacterA
WriteConsoleA
ConnectNamedPipe
UnlockFileEx
GetFullPathNameA
GetLocaleInfoA
Heap32ListNext
user32
DestroyWindow
shlwapi
PathAddBackslashW
advapi32
AddAccessAllowedAceEx
Sections
.text Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 98KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ