Static task
static1
Behavioral task
behavioral1
Sample
36413effd084c29eb0dea720adf333b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36413effd084c29eb0dea720adf333b7.exe
Resource
win10v2004-20231215-en
General
-
Target
36413effd084c29eb0dea720adf333b7
-
Size
239KB
-
MD5
36413effd084c29eb0dea720adf333b7
-
SHA1
5d276107012aa552b8cf921c4952570645869255
-
SHA256
c318899a39a560c8f53baec4e27428523362b5fb41fae6d03cf43944ea8e11dc
-
SHA512
58ceb17c7489b5e4bbd9c7f39cfd0c77c6f31c3d7fe53b7355fce237ad4ab6ff1e735cdbc4846fddc1a56f44c2d02c0a7f3bda46e5ea30158c5201d403ee8b32
-
SSDEEP
3072:wk4OU3kjmwE/eGW3+9AmDRyazjQaKGaeocarHjlj37XzKWL3Zssc:wVOckAZs+emgOQGQjtXz/L3Os
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36413effd084c29eb0dea720adf333b7
Files
-
36413effd084c29eb0dea720adf333b7.exe windows:5 windows x64 arch:x64
11525613f6414fd0e2667f9ac72fe9d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentThreadId
SizeofResource
HeapFree
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
OpenProcess
HeapSize
CreateEventW
GetLastError
TerminateThread
LockResource
HeapReAlloc
CloseHandle
RaiseException
LoadLibraryW
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
HeapDestroy
GetProcAddress
DeleteCriticalSection
GetProcessHeap
ReadFile
SetEndOfFile
WriteConsoleW
SetFilePointerEx
CreateFileW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetStringTypeW
LCMapStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlUnwindEx
SetLastError
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
GetFileType
ReadConsoleW
user32
GetWindowThreadProcessId
GetMessageW
DefWindowProcW
PostMessageW
SendMessageTimeoutW
DestroyWindow
CreateWindowExW
SendMessageW
EndDialog
RegisterClassExW
LoadAcceleratorsW
LoadStringW
DispatchMessageW
TranslateAcceleratorW
TranslateMessage
LoadIconW
LoadCursorW
PostQuitMessage
DialogBoxParamW
UpdateWindow
InvalidateRect
BeginPaint
EndPaint
FindWindowExW
FindWindowW
EnumThreadWindows
ShowWindow
shell32
SHGetSpecialFolderPathW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ