Static task
static1
Behavioral task
behavioral1
Sample
8c51e6dc9a5882c14c15c10a0c17cf6e2b97201e015a734234e962fbbcc2f533.exe
Resource
win10v2004-20240802-en
General
-
Target
8c51e6dc9a5882c14c15c10a0c17cf6e2b97201e015a734234e962fbbcc2f533
-
Size
359KB
-
MD5
b01ad98c144eae58fcda2b5ba23ed0ab
-
SHA1
c8d114dfc4fcf6ff7657f75452fe4efd2e64d9bd
-
SHA256
8c51e6dc9a5882c14c15c10a0c17cf6e2b97201e015a734234e962fbbcc2f533
-
SHA512
0e97748f92b8b6cb2c03bcfc919798e6cb7370a43c230660d4179fc9d5bd2d5a1d2287386f1c7ef22a91aeca80bba90b08bbb34273bc0be273c59ea8b7bd5d5f
-
SSDEEP
6144:724PduROIABh0L6YjWRPvHR1itazjDFEysSHY5qfFAfFxga:y4PduUIABiRjWRBwgL2yskoCIFX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c51e6dc9a5882c14c15c10a0c17cf6e2b97201e015a734234e962fbbcc2f533
Files
-
8c51e6dc9a5882c14c15c10a0c17cf6e2b97201e015a734234e962fbbcc2f533.exe windows:5 windows x86 arch:x86
29e4901487377ba250073d5fced2fd12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
SetFilePointer
PeekNamedPipe
GetConsoleAliasExesA
CommConfigDialogA
GetConsoleAliasExesLengthA
InterlockedIncrement
GetLogicalDriveStringsW
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
QueryDosDeviceA
InterlockedCompareExchange
UnlockFile
GetTickCount
GetNumberFormatA
CreateActCtxW
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetCalendarInfoA
SetVolumeMountPointA
SetConsoleCP
HeapDestroy
GetFileAttributesA
VerifyVersionInfoA
GetACP
CreateJobObjectA
LCMapStringA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
FindVolumeMountPointClose
PeekConsoleInputW
CreateNamedPipeA
GlobalFree
GetProcessVersion
SetThreadPriorityBoost
LoadLibraryA
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
CreateEventW
SetConsoleWindowInfo
HeapWalk
OpenJobObjectW
SetEnvironmentVariableA
GetModuleFileNameA
EnumDateFormatsA
VirtualProtect
SetProcessShutdownParameters
OpenSemaphoreW
GetDiskFreeSpaceExA
GetCurrentProcessId
WriteConsoleW
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
RtlUnwind
SetStdHandle
GetStringTypeW
CreateFileW
LCMapStringW
WideCharToMultiByte
HeapAlloc
MultiByteToWideChar
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapFree
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
GetCPInfo
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
user32
DdeQueryStringA
ChangeMenuW
GetKeyNameTextA
LoadMenuA
GetWindowTextLengthA
GetDC
CharUpperBuffA
LoadMenuW
GetMenuState
GetMenuStringA
winhttp
WinHttpReadData
msimg32
AlphaBlend
Sections
.text Size: 231KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 93KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ