Static task
static1
Behavioral task
behavioral1
Sample
8cad61422d032119219f465331308c5a61e21c9a3a431b88e1f8b25129b7e2a1.dll
Resource
win11-20241007-en
General
-
Target
8cad61422d032119219f465331308c5a61e21c9a3a431b88e1f8b25129b7e2a1.exe
-
Size
469KB
-
MD5
889e320cf66520485e1a0475107d7419
-
SHA1
f5fc9d893ae99f97e43adcef49801782daced2d7
-
SHA256
8cad61422d032119219f465331308c5a61e21c9a3a431b88e1f8b25129b7e2a1
-
SHA512
8da0ab0b3072b3966c5e32c22e7ac5654ff3923b3cf28cc895ae10d520a27bb70360e4d94e54422033aa7c7527d10774ab6d8b8569bab8b6909eb3eab40d62bc
-
SSDEEP
6144:sdqAqUok+00rm9TOi9Vc7/VtXvWLnJlh+efvoRKmjbL/xY4fTKKWSFle3IDgDi2C:xABogwttXuLnJlkkiKU/xtKYydF9iIU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cad61422d032119219f465331308c5a61e21c9a3a431b88e1f8b25129b7e2a1.exe
Files
-
8cad61422d032119219f465331308c5a61e21c9a3a431b88e1f8b25129b7e2a1.exe.dll windows:5 windows x64 arch:x64
1cd9192feb9402723bdada868b8c98de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
ReadFile
CreateFileW
FlushFileBuffers
FindClose
CloseHandle
HeapReAlloc
HeapAlloc
HeapFree
GetProcessHeap
HeapDestroy
HeapCreate
InitializeCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetTimeZoneInformation
ExitProcess
CreateThread
SetEnvironmentVariableA
CompareStringW
WriteFile
WaitForSingleObject
GetCurrentDirectoryW
PeekNamedPipe
GetFileInformationByHandle
GetFullPathNameA
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
Sleep
EnterCriticalSection
GetTickCount
ExpandEnvironmentStringsA
VerSetConditionMask
VerifyVersionInfoA
SleepEx
FormatMessageA
SetEndOfFile
WriteConsoleW
SetStdHandle
CreateFileA
GetConsoleMode
GetConsoleCP
GetStringTypeW
LCMapStringW
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
GetDriveTypeW
FreeEnvironmentStringsW
GetModuleFileNameA
EncodePointer
DecodePointer
GetLastError
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleW
GetCurrentThreadId
FlsSetValue
GetCommandLineA
RaiseException
RtlPcToFileHeader
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
HeapSize
RtlUnwindEx
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlsGetValue
FlsFree
SetLastError
FlsAlloc
HeapSetInformation
GetVersion
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetFileType
GetStartupInfoW
SetFilePointer
LoadLibraryW
advapi32
CryptDestroyKey
CryptImportKey
CryptGenRandom
CryptAcquireContextA
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
CryptEncrypt
shlwapi
StrTrimA
ws2_32
bind
socket
freeaddrinfo
WSASetLastError
closesocket
WSACleanup
htonl
htons
ntohs
recv
send
__WSAFDIsSet
getsockopt
getpeername
gethostname
setsockopt
shutdown
getsockname
WSAGetLastError
select
getaddrinfo
WSAStartup
WSAIoctl
ioctlsocket
connect
Sections
.text Size: 355KB - Virtual size: 355KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ