Static task
static1
Behavioral task
behavioral1
Sample
8cc51b382f0278fadeea5e7aed52ec70dbe6002a47208c183c081a053a87e536.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8cc51b382f0278fadeea5e7aed52ec70dbe6002a47208c183c081a053a87e536.exe
Resource
win10v2004-20241007-en
General
-
Target
8cc51b382f0278fadeea5e7aed52ec70dbe6002a47208c183c081a053a87e536.exe
-
Size
284KB
-
MD5
94702887e769ea473bb1469ea87b55d7
-
SHA1
63837361fb2a3a03d62d0613eb2f5fcded8715ba
-
SHA256
8cc51b382f0278fadeea5e7aed52ec70dbe6002a47208c183c081a053a87e536
-
SHA512
b5fb07c41aff5a9a85c6c1187eb1db492beeaa2e0a941d0e92d71cff0edd98edef0b54725147d7b5b45de07e6ed37c925eab1d0ffa956462191c490dc91f03a8
-
SSDEEP
6144:uKU4NiHNuN7bG5hX8C7aSbB80Ha2JZOz2wCP166:DU4IwGbX8vwB8t2JC2ZX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8cc51b382f0278fadeea5e7aed52ec70dbe6002a47208c183c081a053a87e536.exe
Files
-
8cc51b382f0278fadeea5e7aed52ec70dbe6002a47208c183c081a053a87e536.exe.exe windows:4 windows x86 arch:x86
7e8b812cf0fc13573f9b367a25a839e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptAcquireContextW
CryptGetHashParam
CryptHashData
RegOpenKeyExW
RegCloseKey
CryptDestroyHash
RegQueryValueExW
CryptReleaseContext
CryptCreateHash
rpcrt4
UuidCreate
kernel32
GetFileType
FreeLibrary
HeapAlloc
LeaveCriticalSection
FlushViewOfFile
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetCurrentDirectoryW
GetCurrentThreadId
DeleteCriticalSection
CreateFileMappingW
HeapDestroy
GetModuleHandleW
CreateFileW
LocalAlloc
VirtualFree
EnterCriticalSection
GetFileAttributesExW
SetLastError
SystemTimeToFileTime
GetConsoleMode
ExpandEnvironmentStringsW
UnhandledExceptionFilter
UnmapViewOfFile
GetSystemTime
MapViewOfFileEx
GetSystemInfo
ReadFile
IsDebuggerPresent
RaiseException
VirtualAlloc
GetSystemTimeAsFileTime
DeleteFileW
CloseHandle
SetUnhandledExceptionFilter
DeviceIoControl
SetFileAttributesW
GetFileInformationByHandle
SetFilePointer
HeapFree
WideCharToMultiByte
CopyFileW
VirtualAllocEx
LoadLibraryW
SearchPathA
EnumCalendarInfoW
DosDateTimeToFileTime
CreateEventW
SetLocaleInfoW
GetSystemDirectoryA
lstrlen
FatalAppExitA
GetLocalTime
GetLongPathNameA
SearchPathW
GlobalGetAtomNameA
lstrcmpiA
OpenEventA
GetWindowsDirectoryW
RemoveDirectoryW
Beep
EnumCalendarInfoA
lstrcmp
BeginUpdateResourceA
GetWindowsDirectoryA
FindAtomW
GetAtomNameA
EnumTimeFormatsA
MoveFileW
lstrcmpi
GetTimeFormatW
MulDiv
GetTempPathA
CreateSemaphoreA
CreatePipe
GetMailslotInfo
CreateMailslotA
GetDateFormatA
FileTimeToSystemTime
LoadResource
BeginUpdateResourceW
GetVolumeInformationA
GlobalFindAtomW
GetExpandedNameW
GetUserDefaultLCID
OpenMutexW
CreateMutexW
GetCalendarInfoW
lstrcmpW
GetProcessHeap
lstrlenW
SetComputerNameA
QueryPerformanceFrequency
GlobalDeleteAtom
GlobalGetAtomNameW
GetLongPathNameW
GetSystemDirectoryW
GetSystemDefaultLCID
FileTimeToDosDateTime
CopyFileExA
wshrm
WSHGetSockaddrType
WSHGetSocketInformation
WSHGetWildcardSockaddr
WSHOpenSocket2
WSHGetBroadcastSockaddr
WSHJoinLeaf
WSHOpenSocket
WSHNotify
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 369KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 246KB - Virtual size: 10.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ