Static task
static1
Behavioral task
behavioral1
Sample
371f31258f31737c09d79bcc0ef11727.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
371f31258f31737c09d79bcc0ef11727.exe
Resource
win10v2004-20231222-en
General
-
Target
371f31258f31737c09d79bcc0ef11727
-
Size
116KB
-
MD5
371f31258f31737c09d79bcc0ef11727
-
SHA1
76bc80ad288e4603eba0f5fa70977b5e00b00e64
-
SHA256
605dd15cf1c1c1f78036cae48daff929fcfdf05268612f635bc1789a1014f310
-
SHA512
1c0f07c38e7147b79e94a3b948eb789286a3faf3318a4220fa7c989bf9200f5fe470615c8be85d827a7db91ed0e7719d1125d160dc8ca8199ab7e23665ce5269
-
SSDEEP
1536:kmXwYx33kHBjTh4abD+murSKvbvZjYDATWhmKv4LDwKgEdP60C9CxwCPJ:kmAYxHkHB3+MurSKzZ2v0pdP60Y2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 371f31258f31737c09d79bcc0ef11727
Files
-
371f31258f31737c09d79bcc0ef11727.exe windows:4 windows x86 arch:x86
c7976f5b67547b28ba9a38042d12f374
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
RaiseException
GetProcAddress
ExitThread
GetOEMCP
lstrcmpiA
GlobalAlloc
GetLastError
GetVersionExA
GetModuleHandleA
CloseHandle
GetCommandLineA
lstrlenA
ExitProcess
VirtualAlloc
comctl32
ImageList_DragShowNolock
shell32
SHGetDiskFreeSpaceA
SHGetFileInfoA
gdi32
SelectObject
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerInstallFileA
advapi32
RegCreateKeyExA
RegDeleteKeyA
user32
GetClipboardData
DestroyMenu
MapVirtualKeyA
EnableWindow
DestroyWindow
RedrawWindow
EnableMenuItem
GetScrollRange
PostMessageA
ShowWindow
CharUpperBuffA
LoadKeyboardLayoutA
UnhookWindowsHookEx
EnumChildWindows
EnumThreadWindows
PtInRect
CharNextW
MessageBeep
GetMenuItemCount
AdjustWindowRectEx
UnregisterClassA
GetWindowThreadProcessId
EmptyClipboard
GetCursor
GetWindowRect
IsRectEmpty
GetDlgItem
DestroyIcon
GetKeyboardState
ScreenToClient
GetKeyboardType
SetActiveWindow
ShowOwnedPopups
SetWindowLongA
CharToOemA
SetCapture
ActivateKeyboardLayout
SetTimer
GetSysColorBrush
TrackPopupMenu
DrawMenuBar
OffsetRect
GetClassNameA
EqualRect
GetMenu
DefWindowProcA
OpenClipboard
SetMenu
GetScrollPos
IsChild
CharLowerA
LoadIconA
DestroyCursor
SetForegroundWindow
GetFocus
SendMessageW
InsertMenuA
SetWindowPlacement
DrawEdge
IsDialogMessageW
DefMDIChildProcA
SetScrollPos
InsertMenuItemA
GetWindowLongA
GetCursorPos
GetDesktopWindow
CreatePopupMenu
TranslateMessage
WaitMessage
SetWindowsHookExA
SetPropA
GetMessagePos
GetWindowLongW
MessageBoxA
ChildWindowFromPoint
CreateIcon
CallWindowProcA
WindowFromPoint
SetFocus
ReleaseCapture
GetActiveWindow
LoadBitmapA
RemoveMenu
GetSystemMenu
GetClassLongA
SetMenuItemInfoA
CharLowerBuffA
GetClassInfoA
SetScrollInfo
IsZoomed
SetCursor
LoadCursorA
BeginPaint
FillRect
RemovePropA
IntersectRect
SetWindowLongW
GetWindowPlacement
ole32
CoCreateInstanceEx
PropVariantClear
Sections
CODE Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.tls Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ