Static task
static1
Behavioral task
behavioral1
Sample
8b1b4ae1cf5a44d0c33463a0af500a48.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b1b4ae1cf5a44d0c33463a0af500a48.exe
Resource
win10v2004-20231215-en
General
-
Target
8b1b4ae1cf5a44d0c33463a0af500a48
-
Size
180KB
-
MD5
8b1b4ae1cf5a44d0c33463a0af500a48
-
SHA1
17de90db79936daa35a3baa9df67b829cdb3695f
-
SHA256
c25be48808b828b21d39883f78b32aae4309da72167f498c0682b141be44ee28
-
SHA512
7217d31e399a90b080a8f0e503963d33b25b86ecf12ce0cfc3c9251a02474931db00d39151ad6e576d661e91dcf597f97f7473e1cac9cb3831de5f85d91970b2
-
SSDEEP
3072:gxBoELoEMLgVysiG1uuDy0TWFWQw41ffzPrIol99bx:gLSGEEbTWFRLMo3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b1b4ae1cf5a44d0c33463a0af500a48
Files
-
8b1b4ae1cf5a44d0c33463a0af500a48.exe windows:4 windows x86 arch:x86
18ff7fc763cec91d93523f2671eaa564
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CallWindowProcA
kernel32
GetProcAddress
CopyFileA
LoadLibraryA
msvbvm60
ord626
__vbaCopyBytes
ord669
ord593
ord595
ord598
ord631
ord632
ord525
ord527
ord529
DllFunctionCall
ord600
__vbaExceptHandler
ord711
ord606
ord607
ord608
ord716
ord717
ProcCallEngine
ord535
ord537
ord644
ord645
ord570
ord648
ord681
ord100
ord616
ord617
ord580
Sections
.text Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ