Static task
static1
Behavioral task
behavioral1
Sample
37a1c6a00ad32353614c39bae93f6ff2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37a1c6a00ad32353614c39bae93f6ff2.exe
Resource
win10v2004-20231215-en
General
-
Target
37a1c6a00ad32353614c39bae93f6ff2
-
Size
344KB
-
MD5
37a1c6a00ad32353614c39bae93f6ff2
-
SHA1
a2a8215733b438b5850bdc8660101f03b51c3593
-
SHA256
08b965aded73ec5e71442876819d3b4ba2d2fffcd1e18691f1da467337c01d27
-
SHA512
427e88a22fb55d21c1823801398b0789a32445537e2dee274251a98e2f40085d2dd56ceb8f155dc38d2f9fcbb3a42af3e419657e30e122cf466251a386427b98
-
SSDEEP
6144:IKYSyqsB/rDaDKkwkcUvK3aa6OI65uxjby:ItSyqOHUJcUvUTuFy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37a1c6a00ad32353614c39bae93f6ff2
Files
-
37a1c6a00ad32353614c39bae93f6ff2.exe windows:4 windows x86 arch:x86
cf8d7dc01526ee95c78c582f3570f5cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
ExitProcess
Sleep
VirtualFreeEx
ResumeThread
HeapFree
GetLastError
GetProcAddress
GetModuleHandleA
VirtualLock
VirtualAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
HeapReAlloc
HeapAlloc
user32
LoadBitmapA
advapi32
CryptAcquireContextA
CryptExportKey
shell32
DuplicateIcon
ole32
CoUninitialize
avifil32
AVISaveOptionsFree
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 236KB - Virtual size: 234KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 526KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ