Static task
static1
Behavioral task
behavioral1
Sample
36c851bde87e81285390ec0bd9303a69.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36c851bde87e81285390ec0bd9303a69.exe
Resource
win10v2004-20231222-en
General
-
Target
36c851bde87e81285390ec0bd9303a69
-
Size
203KB
-
MD5
36c851bde87e81285390ec0bd9303a69
-
SHA1
5cc38e10b802af50f650270093fddc86dbaf4324
-
SHA256
b9651587dbf8796cf519a49dfc2fd77332a5253a057df0b67c592f695c1e3f11
-
SHA512
d9319485fbbdd9bcc11353fb07af5c52888f4ea1873a194f31fa66a9283b2e6f07c707fcff2afed873eb1b77d66db42e1d6245878d28dba34f75e386f574e660
-
SSDEEP
3072:5vtiSdwjCbUr1F5t0GOWZeMQhmkwPt46W0+m3IaCdgmSXubCRKYKcgKNMtMpg:V2CIn52nRMwNwPCp0H3IaCimKu+9g7M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36c851bde87e81285390ec0bd9303a69
Files
-
36c851bde87e81285390ec0bd9303a69.exe windows:4 windows x86 arch:x86
dbb86fdf03d01f75effc88cfb184b78f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
SHStrDupA
msvcrt
sprintf
memcmp
swprintf
wcstol
oleaut32
SysReAllocStringLen
SysAllocStringLen
RegisterTypeLib
SafeArrayUnaccessData
shell32
SHGetFolderPathA
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetDesktopFolder
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegOpenKeyA
user32
PostQuitMessage
RemovePropA
RedrawWindow
LoadCursorA
MessageBoxA
ScrollWindow
SendMessageA
OffsetRect
RegisterWindowMessageA
LoadBitmapA
MapWindowPoints
LoadKeyboardLayoutA
PeekMessageA
ReleaseDC
SendMessageW
RemoveMenu
OemToCharA
LoadIconA
SetActiveWindow
MapVirtualKeyA
PostMessageA
ReleaseCapture
ScreenToClient
PtInRect
RegisterClipboardFormatA
RegisterClassA
MessageBeep
LoadStringA
PeekMessageW
OpenClipboard
kernel32
GetCommandLineA
MoveFileExA
LocalFree
ExitThread
WideCharToMultiByte
GetVersionExA
LocalAlloc
VirtualQuery
MoveFileA
VirtualFree
IsBadReadPtr
VirtualAllocEx
GetProcAddress
LoadLibraryA
lstrcpynA
lstrcatA
lstrcmpiA
LocalReAlloc
lstrcmpA
ExitProcess
VirtualAlloc
MulDiv
GetModuleHandleA
lstrcpyA
lstrlenA
SizeofResource
GetCommandLineW
HeapDestroy
WaitForSingleObject
LoadLibraryExA
GetACP
WriteFile
ole32
OleRegGetUserType
ReleaseStgMedium
CreateOleAdviseHolder
CoGetContextToken
CoRegisterClassObject
CoGetMalloc
version
VerFindFileA
GetFileVersionInfoSizeA
gdi32
CreateDIBSection
SetPixel
GetBitmapBits
CreateDIBitmap
CreateFontIndirectA
SetBkMode
CopyEnhMetaFileA
CreatePenIndirect
CreatePalette
comctl32
ImageList_Draw
ImageList_Create
ImageList_GetBkColor
Sections
CODE Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 505B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc4 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc7 Size: 512B - Virtual size: 203B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc6 Size: 3KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc8 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ