Static task
static1
Behavioral task
behavioral1
Sample
8bf8dba4f2f1faf9ebf6f813dc257449d7a0a12410c1b265065312b088a990cf.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8bf8dba4f2f1faf9ebf6f813dc257449d7a0a12410c1b265065312b088a990cf.exe
Resource
win10v2004-20240508-en
General
-
Target
8bf8dba4f2f1faf9ebf6f813dc257449d7a0a12410c1b265065312b088a990cf
-
Size
104KB
-
MD5
802d4576ea387df74bdc734012b44ad6
-
SHA1
7f5eaedcc48ad8d814f3300aec20b59dfcafe077
-
SHA256
8bf8dba4f2f1faf9ebf6f813dc257449d7a0a12410c1b265065312b088a990cf
-
SHA512
1b5cebfd7e4d10850969a74ceca9c57eec8d426a2cc856afdb3cda5eff9fe6b5ebdb44874a0754dbf3773a15852077fa0040f6a48575ddd66ea7441be92a7c07
-
SSDEEP
1536:k6S1KHYe5hUzpSky9GzC+uk3LYzz9efAz8nkKBadwG7:PHYQWpZmUfAz8nkKBg57
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bf8dba4f2f1faf9ebf6f813dc257449d7a0a12410c1b265065312b088a990cf
Files
-
8bf8dba4f2f1faf9ebf6f813dc257449d7a0a12410c1b265065312b088a990cf.exe windows:4 windows x86 arch:x86
7dbc50c83053e6a48098c9dda944b0a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord2107
ord941
ord939
ord819
ord700
ord801
ord6145
ord6143
ord568
ord398
ord541
ord5863
ord6883
ord913
ord1168
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord6383
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord815
ord561
ord1575
ord4204
ord859
ord5710
ord5683
ord6283
ord4129
ord5856
ord532
ord353
ord4160
ord2784
ord1247
ord5440
ord2841
ord6394
ord5450
ord825
ord3663
ord540
ord537
ord940
ord858
ord800
ord2818
ord860
ord5714
ord535
msvcrt
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_gcvt
_mbscmp
atof
_onexit
sprintf
strlen
_getcwd
_CxxThrowException
malloc
pow
abs
free
strcmp
strncmp
atoi
printf
fopen
_ftol
fabs
__CxxFrameHandler
fread
memset
memcpy
fclose
__dllonexit
strcpy
_itoa
_control87
floor
fgetc
kernel32
FormatMessageA
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemTime
SetCurrentDirectoryA
GetCommandLineA
GetModuleHandleA
user32
wsprintfA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
wsock32
WSAStartup
ntohs
ioctlsocket
htons
socket
gethostname
connect
select
send
WSAGetLastError
recv
closesocket
WSACleanup
gethostbyname
inet_ntoa
getservbyname
msvcp60
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
msvcirt
??6ostream@@QAEAAV0@PBD@Z
?cout@@3Vostream_withassign@@A
?endl@@YAAAVostream@@AAV1@@Z
??6ostream@@QAEAAV0@H@Z
??6ostream@@QAEAAV0@I@Z
??6ostream@@QAEAAV0@N@Z
??6ostream@@QAEAAV0@PBE@Z
??6ostream@@QAEAAV0@M@Z
??6ostream@@QAEAAV0@P6AAAV0@AAV0@@Z@Z
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ