Static task
static1
Behavioral task
behavioral1
Sample
8bb9c1ae2cbe700cb0ddeec2b919b16f8c1b5103c02ad1856fe836bb507bc06e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8bb9c1ae2cbe700cb0ddeec2b919b16f8c1b5103c02ad1856fe836bb507bc06e.exe
Resource
win10v2004-20240802-en
General
-
Target
8bb9c1ae2cbe700cb0ddeec2b919b16f8c1b5103c02ad1856fe836bb507bc06e
-
Size
371KB
-
MD5
11c169c654c9bcaf68881f6d8d45d6dd
-
SHA1
733eba25d0af5d4250f48b6ab8b192b2d98648f6
-
SHA256
8bb9c1ae2cbe700cb0ddeec2b919b16f8c1b5103c02ad1856fe836bb507bc06e
-
SHA512
b8cbe5d671962d37e784728cbe07b4d2c33950d2c464e9c26170fede8495c53c034d4789fc617dbf779e6030eb81ebc78883fae3d1a186339f3afe942cc0492c
-
SSDEEP
6144:mQWPv1vd6UCrmt4fNSUy0lNcib6Btq7Qh0Y6U57A:mQWn5d6RC4ffv6BtiQ61U57A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8bb9c1ae2cbe700cb0ddeec2b919b16f8c1b5103c02ad1856fe836bb507bc06e
Files
-
8bb9c1ae2cbe700cb0ddeec2b919b16f8c1b5103c02ad1856fe836bb507bc06e.exe windows:5 windows x86 arch:x86
16dbe57429133bb44a293d74de9b8684
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
WriteFile
ReadFile
SetFilePointer
CloseHandle
CreateFileW
TerminateThread
lstrcpynA
HeapAlloc
HeapFree
GetProcessHeap
TerminateProcess
DeviceIoControl
FindClose
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
CreateDirectoryW
SetFileAttributesW
FindFirstFileW
FindNextFileW
CopyFileExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Sleep
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
CopyFileW
DeleteFileW
GetTempPathW
WinExec
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
ResumeThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetProcAddress
GetStartupInfoW
TlsFree
Process32NextW
CreateThread
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
RtlUnwind
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
user32
LoadStringW
wvsprintfW
FindWindowExW
FindWindowW
PostMessageW
PostThreadMessageW
wsprintfW
shell32
ShellExecuteW
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHFileOperationW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
ws2_32
recv
gethostbyname
htons
connect
closesocket
socket
send
WSAStartup
shlwapi
PathFileExistsW
wininet
InternetSetFilePointer
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetOpenUrlW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 260KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ