Static task
static1
Behavioral task
behavioral1
Sample
c8bc98d76cd44b466065b0c73a2f2c2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8bc98d76cd44b466065b0c73a2f2c2e.exe
Resource
win10v2004-20240226-en
General
-
Target
c8bc98d76cd44b466065b0c73a2f2c2e
-
Size
77KB
-
MD5
c8bc98d76cd44b466065b0c73a2f2c2e
-
SHA1
70167eebf234eb19ace8b005a8f119ecbe378eff
-
SHA256
e1f11c779bdc862cddccfb09846df3c349b6e934b39ab7c7fec8e3b9c09ab717
-
SHA512
aee9b4d7400c9e1d3e5aa36bc128d98f30a30ae2fffae54061d4b9e6f97272c7669070e8260c95cd826ddc42a6b0592f5b871f3541d36c18f2340d0f5fb06914
-
SSDEEP
1536:f7sdY5BOny2luEUzhE74inCkSWBY1q0KpDlneJgXaAtyFFKWcrrngazac3LlOjY:Ts+XyjQh64intSWUKvn5qAt80WcZDBO0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8bc98d76cd44b466065b0c73a2f2c2e
Files
-
c8bc98d76cd44b466065b0c73a2f2c2e.exe windows:4 windows x86 arch:x86
7315414fe1d362c651079374c8efd2ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
LoadLibraryA
GetLastError
LocalFree
GetModuleHandleA
GetModuleHandleA
LeaveCriticalSection
GetProcAddress
GetModuleFileNameA
CreateFileW
ReadFile
lstrcmpiW
GetModuleHandleA
GetModuleHandleA
GetCurrentProcess
ReadFile
SetEvent
LoadLibraryA
SetLastError
GetVersionExA
GetModuleHandleA
GetModuleHandleA
TerminateProcess
VirtualFree
TerminateProcess
HeapDestroy
GetLastError
VirtualFree
user32
UnregisterClassW
RegisterClassA
PostMessageW
GetForegroundWindow
SetDlgItemTextA
GetMenuItemCount
wsprintfA
LoadCursorA
SendDlgItemMessageW
CheckMenuItem
PeekMessageA
wsprintfA
CheckDlgButton
MessageBeep
IsDlgButtonChecked
GetParent
GetDesktopWindow
GetWindowRect
GetParent
SendMessageA
GetDlgCtrlID
InvalidateRect
DispatchMessageA
GetLastActivePopup
CreateDialogParamW
LoadStringA
wsprintfW
PeekMessageA
GetWindowThreadProcessId
LoadIconW
shell32
CommandLineToArgvW
CommandLineToArgvW
DragQueryFileW
ShellExecuteW
CommandLineToArgvW
ExtractIconW
ShellAboutW
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
ShellExecuteW
ExtractIconExW
ShellExecuteW
ShellExecuteW
DragFinish
CommandLineToArgvW
SHGetFolderPathW
SHGetSpecialFolderPathW
ExtractIconExW
CommandLineToArgvW
SHGetDesktopFolder
SHChangeNotify
ShellExecuteW
SHGetFolderPathW
ShellAboutW
SHGetPathFromIDListW
advapi32
RegDeleteValueW
RegCloseKey
RegCloseKey
RegCreateKeyW
OpenThreadToken
SetSecurityDescriptorGroup
RegisterServiceCtrlHandlerW
RegQueryValueExW
InitializeAcl
RegFlushKey
RegOpenKeyExA
RegCloseKey
RegSetValueExW
RegOpenKeyW
GetUserNameW
ReportEventW
RegQueryInfoKeyA
GetAce
QueryServiceStatus
CheckTokenMembership
RegEnumValueW
OpenProcessToken
AdjustTokenPrivileges
RegCreateKeyExA
OpenServiceW
AllocateAndInitializeSid
SetSecurityDescriptorGroup
GetTokenInformation
gdi32
CreateFontIndirectW
BitBlt
PatBlt
StretchBlt
SelectObject
BitBlt
CreateSolidBrush
GetDeviceCaps
SelectObject
TextOutW
LineTo
SelectPalette
CreatePatternBrush
GetObjectW
DeleteObject
SetTextColor
Sections
.text Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ