Static task
static1
Behavioral task
behavioral1
Sample
39147fc61e15dfa943c1d0656395241b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39147fc61e15dfa943c1d0656395241b.exe
Resource
win10v2004-20231215-en
General
-
Target
39147fc61e15dfa943c1d0656395241b
-
Size
89KB
-
MD5
39147fc61e15dfa943c1d0656395241b
-
SHA1
095d36547f1ca84077bd880dbbfaffe0815c425b
-
SHA256
7147d15c102eb6552128a09ed34a78771454959c689b71adbc7c742bdc491424
-
SHA512
3835b42b180a657fbea57c6d90da1b847c65343d76316d220a2742ba8c5e7aa99574026565bc133baa41f991c0b31964385c8a8d6d2868ec9024e6ec8446e0ba
-
SSDEEP
768:XL3LzfkaLn2R8f+Rd4BDMVAaAF8tXID8wx8z+xSSJqM+fHfB68c8giIUq0YM7X:7bzRhNhFSYfsUnof/s8X3q0d7X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39147fc61e15dfa943c1d0656395241b
Files
-
39147fc61e15dfa943c1d0656395241b.exe windows:4 windows x86 arch:x86
c77f1c25e8a865a9b044a14d3a212a0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
ExitProcess
GetDiskFreeSpaceA
FindVolumeClose
SearchPathA
VirtualProtect
GetTickCount
FindAtomA
GetConsoleFontSize
CreateThread
CloseHandle
lstrlenA
GetModuleHandleA
Sleep
ReleaseMutex
DeleteCriticalSection
FindClose
FindResourceExA
GetLastError
SetEvent
user32
CloseWindow
CreateMenu
DragDetect
DispatchMessageA
DialogBoxParamA
CreateWindowExA
CopyImage
GetScrollBarInfo
IsIconic
GetMessageA
EnableWindow
EndDialog
CopyIcon
GetKeyState
wshbth
WSHOpenSocket2
WSHJoinLeaf
WSHNotify
NSPStartup
WSHIoctl
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE