Static task
static1
Behavioral task
behavioral1
Sample
8a6f9fd77cb885d80d4926f96d833fe2498afd04380c18f55365ff13d006c45d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
8a6f9fd77cb885d80d4926f96d833fe2498afd04380c18f55365ff13d006c45d.exe
Resource
win11-20240508-en
General
-
Target
8a6f9fd77cb885d80d4926f96d833fe2498afd04380c18f55365ff13d006c45d
-
Size
325KB
-
MD5
5e52b336bbf8c516893d46db4ee9f645
-
SHA1
a7de71030208b9452dd9633b2ebb359fa1f4e07f
-
SHA256
8a6f9fd77cb885d80d4926f96d833fe2498afd04380c18f55365ff13d006c45d
-
SHA512
2d59633cedb7bf5530386785746c9346c82d80f5da522be0b8163bee5159911d513031072c2d82a0f193805524dc191e4a55517a04e4de54aeae55a0e2370f02
-
SSDEEP
6144:AbfTI+D+QaYiaeeMy8yY2F2VpuK2pZTb+els:AbfTIFQatpy8+ApufpZx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a6f9fd77cb885d80d4926f96d833fe2498afd04380c18f55365ff13d006c45d
Files
-
8a6f9fd77cb885d80d4926f96d833fe2498afd04380c18f55365ff13d006c45d.exe windows:5 windows x86 arch:x86
df3a1d2939e1b347e5da8c3bb01fd501
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetLastError
SetLastError
ReadProcessMemory
GetTickCount
_lopen
OpenEventA
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
GetModuleHandleW
GetSystemDirectoryW
CreateDirectoryA
SetFileAttributesW
GetVolumeInformationA
IsBadStringPtrA
GetProcAddress
CommConfigDialogA
SetComputerNameExA
SetInformationJobObject
FindNextVolumeA
FindFirstVolumeMountPointW
SetVolumeMountPointW
GetOEMCP
GetLocaleInfoA
GetNumberFormatA
GetStringTypeW
SetConsoleCursorInfo
AllocConsole
AddConsoleAliasW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
BuildCommDCBA
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsDebuggerPresent
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetCPInfo
HeapReAlloc
OutputDebugStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
CreateFileW
user32
GetSysColorBrush
SetMenu
DdeKeepStringHandle
gdi32
GetCharWidthA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 95KB - Virtual size: 40.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ