?VexeVersion@@YAPADXZ
Static task
static1
Behavioral task
behavioral1
Sample
39dddbb14297f8ca869faf0411b6d6f1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39dddbb14297f8ca869faf0411b6d6f1.exe
Resource
win10v2004-20231215-en
General
-
Target
39dddbb14297f8ca869faf0411b6d6f1
-
Size
524KB
-
MD5
39dddbb14297f8ca869faf0411b6d6f1
-
SHA1
6798deb484d7eb575c960692f1625ebd80d0100f
-
SHA256
34f6e850b1d9528730db86f9eb2735f92fe0ab2100a21d1f65d3a12b8a31d4da
-
SHA512
7512221d1fb658d757d013f2757283f8212815652a919595c23f48f7297d8438c0414447c6ec45eec509b5c50ad5a0491cc02fe505704e0f7899c63ba5288e0a
-
SSDEEP
1536:VYcRSCGZ4QAC+N8bnWX1sIdWznYut8QigmREBQKxY0nLaj:VVGZDAn8bnWXmznYq/igySQ0Y0Oj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39dddbb14297f8ca869faf0411b6d6f1
Files
-
39dddbb14297f8ca869faf0411b6d6f1.exe windows:4 windows x86 arch:x86
db85b653e9a09da8366f5c18eea92ece
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__getmainargs
_adjust_fdiv
__p___initenv
_XcptFilter
_initterm
__setusermatherr
__p__commode
_controlfp
__p__fmode
sprintf
__set_app_type
_except_handler3
_exit
strcmp
strlen
strncmp
exit
atol
msvcirt
?cerr@@3Vostream_withassign@@A
??6ostream@@QAEAAV0@K@Z
??6ostream@@QAEAAV0@PBD@Z
?cout@@3Vostream_withassign@@A
?flush@ostream@@QAEAAV1@XZ
kernel32
GetLastError
GetConsoleCP
FormatMessageA
user32
GetDesktopWindow
wininet
InternetCloseHandle
InternetErrorDlg
InternetReadFile
HttpSendRequestA
HttpQueryInfoA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetSetOptionExA
InternetConnectA
InternetOpenA
InternetCrackUrlA
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE