Static task
static1
Behavioral task
behavioral1
Sample
8a0470e292b74b66011449c5347c3252.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a0470e292b74b66011449c5347c3252.exe
Resource
win10v2004-20231215-en
General
-
Target
8a0470e292b74b66011449c5347c3252
-
Size
132KB
-
MD5
8a0470e292b74b66011449c5347c3252
-
SHA1
d3b7168e8471e06f9a8856f31816817d972dac83
-
SHA256
71ddc8488e852d55f6aed470b414fcdb0e8c8bfb7b56f767d2aee5ac4db90278
-
SHA512
1d4ea74e8afb8a4265e10d9a8738535bed0f58b5fa7044fab7194069401af7f1a9c576378111f58897d5671031840f5bd714647425c16fbafc56e5d710783283
-
SSDEEP
3072:Ssi95hFri6VuEqG+zq2RkDeisT4Rnn3I0coBR3jqmW:8Zbq9aiVan3IfUjdW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a0470e292b74b66011449c5347c3252
Files
-
8a0470e292b74b66011449c5347c3252.exe windows:4 windows x86 arch:x86
eb6ed87b684ec3f2cc2592243d25343a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
ExitProcess
GetStartupInfoA
OpenSemaphoreW
GetThreadContext
GetProfileSectionA
SetFileAttributesA
GetVolumePathNameW
SetFileTime
GetCurrentProcess
OpenSemaphoreA
AddAtomW
SetConsoleFont
GetUserDefaultLangID
GetUserDefaultLangID
SetCommBreak
CreateFiber
RemoveDirectoryA
GetACP
TlsSetValue
SetUnhandledExceptionFilter
SetFilePointerEx
InterlockedCompareExchange
GetDriveTypeA
CompareFileTime
Sections
code Size: 8KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
data Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ