Static task
static1
Behavioral task
behavioral1
Sample
c8b75cc7d1d9d146a0143280680e2319.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8b75cc7d1d9d146a0143280680e2319.exe
Resource
win10v2004-20240226-en
General
-
Target
c8b75cc7d1d9d146a0143280680e2319
-
Size
164KB
-
MD5
c8b75cc7d1d9d146a0143280680e2319
-
SHA1
61cf60baa45bb3aa6b459d964ffce5d0a535db55
-
SHA256
3f103ee2112786f6d9a6ac204f1ece88df435388ee8ca9cef82f1945a6130d0a
-
SHA512
8d9ef11bb1f32777fa8da068f89b8616722489d7f8de6bac88eec92e2946cae81c567229150e2a65ef00426cb6ee8cb143d91abe22d3300fbee8fb4409c9270d
-
SSDEEP
3072:NSlNAyx1+fhvFoEdqhJEkiLgRP19ip8AtIXycqKG1j+:I71WNPsE9LotABIXvS1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8b75cc7d1d9d146a0143280680e2319
Files
-
c8b75cc7d1d9d146a0143280680e2319.exe windows:4 windows x86 arch:x86
ded7e5632e4e3bd899cbbaea82ea5553
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
CreateThread
CompareFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetLastError
DeleteCriticalSection
InitializeCriticalSection
SetProcessShutdownParameters
lstrcmpiA
GetTickCount
FindNextFileA
CreateDirectoryA
GetTempFileNameA
EnterCriticalSection
GetFileTime
LeaveCriticalSection
DeleteFileA
GetFileSize
CreateFileA
WaitForSingleObject
UnmapViewOfFile
lstrlenA
lstrcpyA
lstrcatA
CreateFileMappingA
MapViewOfFile
GetTempPathA
FindClose
LocalFree
GetBinaryTypeA
GetModuleFileNameA
LocalAlloc
GetVersionExA
lstrcpynA
GetCurrentProcess
SetLastError
GetEnvironmentVariableA
ReleaseMutex
GlobalFree
FlushViewOfFile
lstrlenW
GlobalLock
GlobalUnlock
GlobalHandle
IsBadCodePtr
SetErrorMode
CreateProcessA
GetDriveTypeA
SetFileTime
SystemTimeToFileTime
GetSystemTime
LockResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
GetFileAttributesA
SetFilePointer
ReadFile
GetCurrentThreadId
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
TerminateProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
GetCPInfo
GetACP
GetOEMCP
SetConsoleCtrlHandler
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
GlobalAlloc
CreateMutexA
InterlockedExchange
user32
wsprintfA
CharNextA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
SetTimer
SendMessageA
PostMessageA
RegisterWindowMessageA
PostThreadMessageA
advapi32
FreeSid
AllocateAndInitializeSid
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetSecurityDescriptorDacl
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegSetValueExA
RegCreateKeyExA
RegUnLoadKeyA
RegDeleteValueA
RegDeleteKeyA
imm32
ImmDisableIME
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE