Static task
static1
Behavioral task
behavioral1
Sample
36b31a30e1b8990e79910a6da889762c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36b31a30e1b8990e79910a6da889762c.exe
Resource
win10v2004-20231215-en
General
-
Target
36b31a30e1b8990e79910a6da889762c
-
Size
104KB
-
MD5
36b31a30e1b8990e79910a6da889762c
-
SHA1
05626fb7f59fcb7df99c92aeae0e8ea5ece29708
-
SHA256
c610e09c1c89a9bf76b12cfa697f07cda065d515fe1b584579f04488baa7a47a
-
SHA512
8a0c0b27529b51f34c3fd99b0b01bec8b884bd8a482acf0975d3c170da3bb03c7adb0bac463b6e4914d0bdd97b16201138d50da8f79993481a71bff67290ce31
-
SSDEEP
1536:+u13NfbFcs84oefEfqusoD1+Np8YI+f7oSMBMFeQRKo2gU3akx6:+u5NfbFslpT1+I+f7m08oPkx6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36b31a30e1b8990e79910a6da889762c
Files
-
36b31a30e1b8990e79910a6da889762c.exe windows:1 windows x86 arch:x86
6cb85bf2f5552cd0b56a6d85cf4c0bb0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
EnumSystemLocalesA
GetCommandLineA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetTickCount
GetVersion
GlobalLock
IsDebuggerPresent
LoadLibraryA
SwitchToThread
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcmpA
lstrcpyA
lstrlenA
user32
ClientToScreen
ClipCursor
EndDialog
EqualRect
FindWindowExA
GetMenu
GetMessagePos
GetTopWindow
InvalidateRect
IsCharUpperA
IsWindow
LoadCursorA
MonitorFromRect
PeekMessageA
PostQuitMessage
ShowCaret
ShowCursor
SwitchDesktop
TrackPopupMenuEx
gdi32
CopyMetaFileA
EndDoc
FillPath
SetBkColor
SetTextColor
advapi32
PrivilegedServiceAuditAlarmA
RegCloseKey
RegDeleteKeyA
RegEnumKeyA
RegGetKeySecurity
RegOpenKeyA
RegQueryValueA
RegQueryValueExA
RevertToSelf
SetSecurityDescriptorControl
SetTokenInformation
Sections
.data Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 580B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1024B - Virtual size: 655B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 257B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE