Static task
static1
Behavioral task
behavioral1
Sample
379e83b443fe6a673eacf7e281d0d056.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
379e83b443fe6a673eacf7e281d0d056.exe
Resource
win10v2004-20231215-en
General
-
Target
379e83b443fe6a673eacf7e281d0d056
-
Size
304KB
-
MD5
379e83b443fe6a673eacf7e281d0d056
-
SHA1
1561082ae7c6e4e8aba843309b9825df8039e84b
-
SHA256
58f565ee88cff9128ec5eee93be0dbdcbc867aa1ad90fdcd9b5753076013ab4d
-
SHA512
e11227221969a70aa4931b3ea242bde22fe6cddfaccf9afab0fa2ad7b9275e66059f833cd7ae8b6db73dfdeb9ec2ae4bca163f35d1219b2bc13511b813e8b729
-
SSDEEP
6144:esuNLLG978RjeHnfh/iSgsD8LEw0Oyu3qZT52PDKb:9cLL4j8awhyg492P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 379e83b443fe6a673eacf7e281d0d056
Files
-
379e83b443fe6a673eacf7e281d0d056.exe windows:4 windows x86 arch:x86
22efb5738b73f5019a3a29617f85f53c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemTime
GetFileAttributesW
GlobalFree
GetPriorityClass
CloseHandle
ResetEvent
MapViewOfFile
VirtualAlloc
HeapDestroy
LoadLibraryA
GetComputerNameA
GetCommandLineA
GetModuleHandleW
lstrlenW
IsDebuggerPresent
GetPrivateProfileIntA
FindAtomA
CreateFileMappingA
ResumeThread
user32
GetClientRect
GetMenu
CallWindowProcA
CreateWindowExA
EndDialog
DrawStateA
DispatchMessageA
GetDlgItem
GetCaretPos
CloseWindow
DestroyCaret
FillRect
GetClassInfoA
ntshrui
GetLocalPathFromNetResourceA
GetNetResourceFromLocalPathA
IsPathSharedW
IsFolderPrivateForUser
IsPathSharedA
cmdial32
RasCustomDial
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ