Static task
static1
Behavioral task
behavioral1
Sample
8c8c667d5df3fa63b37a86436504a0ff.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c8c667d5df3fa63b37a86436504a0ff.exe
Resource
win10v2004-20231215-en
General
-
Target
8c8c667d5df3fa63b37a86436504a0ff
-
Size
19KB
-
MD5
8c8c667d5df3fa63b37a86436504a0ff
-
SHA1
1a1712a51022a50540db74ba9c68c7369aea8a85
-
SHA256
1c050b54ba993f7ea6d9c262609257614183e3b2e4742c75057119d2eeec76ba
-
SHA512
e8eb265fbbb4665cfa70f3c9d81b2ea67d10e443dcb01b785990491d1eb557e4f2cd985e61e765af913b0093b568e4c6e1f8eaaad6bdf9b57e106a7218a3574e
-
SSDEEP
384:VUozolaO/RWYyBRzN/5G9wpL8lChFipIp:VUo4RszVk9wIf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c8c667d5df3fa63b37a86436504a0ff
Files
-
8c8c667d5df3fa63b37a86436504a0ff.exe windows:5 windows x86 arch:x86
3df0b35fe23d71169c9c5acf68e5274d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ExitProcess
RtlUnwind
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
user32
MessageBoxW
advapi32
RegOpenKeyExA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data2 Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 546B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ