Static task
static1
Behavioral task
behavioral1
Sample
32fa501e7935946b83300b184de27ec2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
32fa501e7935946b83300b184de27ec2.exe
Resource
win10v2004-20231215-en
General
-
Target
32fa501e7935946b83300b184de27ec2
-
Size
126KB
-
MD5
32fa501e7935946b83300b184de27ec2
-
SHA1
96d2fa280e8ab46e89a7a32a93f23541d689e719
-
SHA256
98be1f356c357f01b6f6e58135f069d00e36c5a1e2b3e40d9e613454a423f59d
-
SHA512
880687d22896f2851090c2803515b7285882753435bbfdac91590b00e35105c273ece50799689524a8833763d430a4b28b6dc400ba3765d7d747f4e9e752261b
-
SSDEEP
3072:gzU/ep+RZIy9M2hH7pGCtd+UJQ/OKIp7xKKTzoUe+QV4zcXrefC:cU/aoZI8lVBfQ0x/QU2V4I7e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32fa501e7935946b83300b184de27ec2
Files
-
32fa501e7935946b83300b184de27ec2.exe windows:4 windows x86 arch:x86
b84750236ac19381da18063adc16f539
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeviceIoControl
FreeConsole
DefineDosDeviceA
GetProcAddress
GetFileAttributesA
GetModuleHandleA
CreateConsoleScreenBuffer
DosDateTimeToFileTime
GetSystemDefaultLangID
GetEnvironmentVariableA
GetProcessWorkingSetSize
GetPrivateProfileStringA
OutputDebugStringA
IsSystemResumeAutomatic
CreateFileMappingA
ReleaseMutex
ReadProcessMemory
CreateIoCompletionPort
WriteProfileStringA
MultiByteToWideChar
FindCloseChangeNotification
PulseEvent
GetVersion
WriteProcessMemory
OpenMutexA
OpenProcess
GetPrivateProfileSectionNamesA
GetExitCodeProcess
GetFileSize
WaitNamedPipeA
GetCommandLineA
GlobalReAlloc
WaitForSingleObject
CommConfigDialogA
GetCommModemStatus
LocalFree
IsBadHugeReadPtr
FormatMessageA
VirtualAllocEx
AreFileApisANSI
GetEnvironmentStrings
GetStdHandle
GetLastError
DuplicateHandle
GetConsoleCursorInfo
LocalHandle
SleepEx
GlobalCompact
GetThreadContext
GetLongPathNameA
LocalShrink
AddAtomA
LoadResource
EraseTape
IsBadReadPtr
GetUserDefaultUILanguage
MoveFileA
SignalObjectAndWait
ClearCommBreak
GetWindowsDirectoryA
CreateDirectoryExA
FlushViewOfFile
WaitForMultipleObjects
CreateDirectoryA
DeleteAtom
UnmapViewOfFile
GetThreadLocale
GetTickCount
SetFileAttributesA
CloseHandle
SearchPathA
GetProcessHeap
GetProcessVersion
GetCPInfo
GetNamedPipeHandleStateA
HeapCreate
SetEvent
WritePrivateProfileStringA
HeapReAlloc
GlobalWire
GlobalUnfix
GlobalUnlock
GetBinaryTypeA
GetFileInformationByHandle
SetFilePointer
GetProfileIntA
ClearCommError
GetNamedPipeInfo
GetProcessHeaps
HeapFree
UnlockFile
GetDriveTypeA
SetErrorMode
CreateSemaphoreA
QueryPerformanceCounter
EndUpdateResourceA
GlobalFlags
LocalReAlloc
PostQueuedCompletionStatus
AllocConsole
FlushInstructionCache
WriteProfileSectionA
SetLastError
IsProcessorFeaturePresent
BeginUpdateResourceA
LocalAlloc
HeapValidate
WideCharToMultiByte
QueryDosDeviceA
GetLocalTime
GetLogicalDrives
MulDiv
LocalCompact
FindClose
GetExitCodeThread
CreateWaitableTimerA
FindAtomA
Beep
ReadConsoleA
WaitForSingleObjectEx
CreateEventA
WritePrivateProfileSectionA
GetFullPathNameA
GetPriorityClass
VirtualQuery
VirtualQueryEx
VirtualUnlock
GetConsoleCP
FreeResource
GetMailslotInfo
GetCPInfoExA
GetShortPathNameA
ContinueDebugEvent
CallNamedPipeA
GetUserDefaultLCID
CancelWaitableTimer
GetCurrentThread
FindResourceA
LocalLock
GetStartupInfoA
msvcrt
srand
time
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE