Static task
static1
Behavioral task
behavioral1
Sample
8702a35692da1f2c472f9996581c0498.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8702a35692da1f2c472f9996581c0498.exe
Resource
win10v2004-20231215-en
General
-
Target
8702a35692da1f2c472f9996581c0498
-
Size
1.9MB
-
MD5
8702a35692da1f2c472f9996581c0498
-
SHA1
f939893a3f13edb00d349916547ad8d808117fed
-
SHA256
78cdaceb5833e160f2dd92ff4b4acd4c50658bd190efdcdd6fbdddef2039c038
-
SHA512
8c7084ff444b71862c5f29a1b5960805275efb35fb0d5bc73e407a13865b10fffc42b93ce0304dfedc693dc7d5fd506b196d252bccdd8f75ab813c32ad79c07a
-
SSDEEP
49152:fdTGrJ7UZ1l07pk4jpp5Zt3srWVVlZO/34cY8:tGrJ7UZapXJsraE/95
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8702a35692da1f2c472f9996581c0498
Files
-
8702a35692da1f2c472f9996581c0498.exe windows:5 windows x86 arch:x86
595c269847735612369df77fe07331f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32 winmm
WaitForSingleObject /�(
winmm
midiStreamOut
ws2_32
WSAAsyncSelect
kernel32
GetTimeZoneInformation
user32
PeekMessageA
gdi32
Escape
winspool.drv
ClosePrinter
advapi32
RegOpenKeyExA
shell32
Shell_NotifyIconA
ole32
StgCreateDocfileOnILockBytes
oleaut32
VariantChangeType
comctl32
ord17
oledlg
ord8
comdlg32
ChooseColorA
msvcrt
malloc
iphlpapi
GetAdaptersInfo
psapi
GetMappedFileNameW
Sections
.text Size: 680KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ