Static task
static1
Behavioral task
behavioral1
Sample
8d420b4aad864a5fae7906cd3fc1bfcb13ac44206e811e910d2b253f0b6e0226.exe
Resource
win10v2004-20240426-en
General
-
Target
8d420b4aad864a5fae7906cd3fc1bfcb13ac44206e811e910d2b253f0b6e0226
-
Size
271KB
-
MD5
a46fd6c0899ebe345826a36063565c8e
-
SHA1
01ee435d68134e665fa78b4c91128876234dcb0a
-
SHA256
8d420b4aad864a5fae7906cd3fc1bfcb13ac44206e811e910d2b253f0b6e0226
-
SHA512
c3fe54cba44f8fd8c099a299987a9496652bbceed5b23103da7e9e0d51f0ff8b5dc83125cfbdcc9125eeab6835cfcb42d10ea9c0d3655efe0965819269bc4d1a
-
SSDEEP
6144:Cnq6A6v1r4FN48NWgWpa94GxGS2bJI6T:Zyv1r8NiaV2R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d420b4aad864a5fae7906cd3fc1bfcb13ac44206e811e910d2b253f0b6e0226
Files
-
8d420b4aad864a5fae7906cd3fc1bfcb13ac44206e811e910d2b253f0b6e0226.exe windows:5 windows x86 arch:x86
afeb64683ef366ef06ee02a86dd880f8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
lstrcatA
QueryInformationJobObject
GetACP
IsBadStringPtrA
GetLastError
SetLastError
GetProcAddress
SetComputerNameA
LoadLibraryA
LocalAlloc
FindFirstVolumeMountPointW
OpenEventA
GetDiskFreeSpaceA
FoldStringA
GetCalendarInfoA
BuildCommDCBA
VirtualProtect
GetWindowsDirectoryW
AddConsoleAliasA
WriteProcessMemory
SetFileAttributesW
CreateFileW
CloseHandle
WriteConsoleW
OutputDebugStringW
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetConsoleMode
TzSpecificLocalTimeToSystemTime
GetUserDefaultLangID
GetTickCount
GetNumberFormatA
InterlockedCompareExchange
CreateDirectoryW
SetConsoleTextAttribute
LoadLibraryExW
GetDefaultCommConfigA
GetSystemDefaultLangID
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapFree
HeapReAlloc
GetCommandLineW
GetCPInfo
RaiseException
RtlUnwind
HeapAlloc
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
LCMapStringW
GetProcessHeap
ExitProcess
GetModuleHandleExW
HeapSize
IsDebuggerPresent
GetStdHandle
GetFileType
GetCurrentThreadId
ReadFile
SetFilePointerEx
WriteFile
user32
DrawCaption
CloseWindow
DdeQueryStringA
DdeCmpStringHandles
LoadMenuW
GetWindowTextLengthA
GetUserObjectSecurity
GetKeyNameTextA
gdi32
GetCharacterPlacementW
DeleteMetaFile
GdiComment
GetPixelFormat
advapi32
ReadEventLogA
ReadEventLogW
RegOpenKeyW
RegisterEventSourceW
CloseEventLog
ole32
CoGetClassObject
CoMarshalHresult
CoRegisterPSClsid
winhttp
WinHttpCheckPlatform
WinHttpSetDefaultProxyConfiguration
WinHttpWriteData
msimg32
AlphaBlend
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ