Static task
static1
Behavioral task
behavioral1
Sample
8a0bb292684c29d969dc9b96622b6000N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a0bb292684c29d969dc9b96622b6000N.exe
Resource
win10v2004-20240802-en
General
-
Target
8a0bb292684c29d969dc9b96622b6000N
-
Size
383KB
-
MD5
8a0bb292684c29d969dc9b96622b6000
-
SHA1
e1b39e4db322047b15aceb687e30f6ecd9f2be61
-
SHA256
1559c0982212372433c642e3de5b2b341b5708ce2721f6873acccb6e1a2eeb16
-
SHA512
4be56d1bcaef44fdbb4feb8081084b9e98d49f1154edddf6557b72ed1995da03d461aa98de848a0b02df9f0a1217b81dabdc2cfdc329eece3590c83c983e1269
-
SSDEEP
6144:hh33ZZfHLnESsFGf4nzUQIkWIW+o0ma+1d1g9TqwCOkSst7:hh33ZZfH7NsO4J8p09qMTkL7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a0bb292684c29d969dc9b96622b6000N
Files
-
8a0bb292684c29d969dc9b96622b6000N.exe windows:5 windows x86 arch:x86
2ddd71fec1e48d49fe731daeeab1d625
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
Sleep
GetLastError
WriteFile
ReadFile
SetFilePointer
CreateFileW
TerminateThread
CreateProcessW
lstrcpynA
HeapAlloc
HeapFree
GetProcessHeap
TerminateProcess
DeviceIoControl
FindClose
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleW
ExpandEnvironmentStringsW
SetCurrentDirectoryW
CreateDirectoryW
SetFileAttributesW
FindNextFileW
CopyFileExW
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
CopyFileW
SetEndOfFile
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
LoadLibraryExW
OutputDebugStringW
FindFirstFileW
DeleteFileW
GetTempPathW
WinExec
CloseHandle
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
ResumeThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
SetFilePointerEx
GetFileType
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetOEMCP
GetACP
IsValidCodePage
GetCurrentThreadId
HeapSize
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetProcAddress
GetStartupInfoW
TlsFree
Process32NextW
CreateThread
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
GetStringTypeW
RaiseException
RtlUnwind
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
user32
LoadStringW
wvsprintfW
FindWindowExW
FindWindowW
PostMessageW
wsprintfW
PostThreadMessageW
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
SHFileOperationW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
ws2_32
recv
gethostbyname
htons
connect
closesocket
socket
send
WSAStartup
shlwapi
PathFileExistsW
wininet
InternetSetFilePointer
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetOpenUrlW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 270KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ