Static task
static1
Behavioral task
behavioral1
Sample
38b0ef8b73bb70ea5f5f79b0d3ea7e70.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38b0ef8b73bb70ea5f5f79b0d3ea7e70.exe
Resource
win10v2004-20231215-en
General
-
Target
38b0ef8b73bb70ea5f5f79b0d3ea7e70
-
Size
143KB
-
MD5
38b0ef8b73bb70ea5f5f79b0d3ea7e70
-
SHA1
2fb8872dea3c3fb6330ebf8ddcef94e189eba794
-
SHA256
26d10702cc9ecf403fa64b1c5ba85f84c124ea9335a2b1aea78bce78234d7660
-
SHA512
8148cc390d6db2af4eae2f73db53b1dcbf48246b89d91bafc9a93ad18b5ba03a73f9701d8d3f6d141f8740ea975ac40545529c750c3da822dafac38e1b39d23c
-
SSDEEP
3072:ZzKnaN1SYCpkbmKZs7c6a6ToXyQnxODeYoicKe:pKoM+f6DE1O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38b0ef8b73bb70ea5f5f79b0d3ea7e70
Files
-
38b0ef8b73bb70ea5f5f79b0d3ea7e70.exe windows:4 windows x86 arch:x86
945ef280205f339e1d68d867f2f75110
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
GetConsoleMode
GetCurrentProcess
GetConsoleOutputCP
CreateDirectoryA
CreateThread
DeleteFileA
GetFileTime
GetFileSize
GetComputerNameA
GetCurrentProcessId
GetOEMCP
GetStdHandle
DeleteAtom
GetCommandLineA
GetLastError
GetUserDefaultLangID
GetCPInfo
DeleteFileW
GetFileTime
GetUserDefaultLangID
GetUserDefaultLCID
CopyFileW
GetCurrentProcess
CreateThread
DeleteAtom
GetFileSize
GetOEMCP
Sleep
CreateProcessA
CreateThread
CopyFileW
GetCurrentProcessId
GetConsoleOutputCP
ExitThread
GetFileTime
GetConsoleMode
FindAtomA
GetCurrentProcess
GetCPInfo
DeleteFileW
GetFileSize
CreateProcessA
GetLastError
GetCurrentThreadId
CreateDirectoryA
DeleteFileA
GetCurrentProcessId
GlobalFree
ExitProcess
GetUserDefaultLangID
FindAtomA
GetFileTime
Sleep
DeleteAtom
GetLastError
GetCurrentThreadId
FindFirstFileA
CreateThread
CopyFileW
FindFirstFileA
GetStdHandle
GetUserDefaultLangID
CreateDirectoryA
ExitProcess
ExitThread
CreateProcessA
DeleteFileW
GetLastError
Sleep
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
DeleteAtom
GetCurrentProcessId
GetFileSize
GetConsoleMode
GetComputerNameA
GetCommandLineA
FindAtomA
GetConsoleOutputCP
DeleteFileW
GetStdHandle
OpenFile
CreateProcessA
CreateDirectoryA
advapi32
RegEnumKeyW
RegQueryInfoKeyA
RegReplaceKeyW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegQueryValueA
RegEnumKeyA
RegLoadKeyA
RegOpenKeyExA
RegLoadKeyW
RegDeleteValueW
RegQueryValueW
RegQueryValueW
RegLoadKeyA
RegQueryValueExW
RegOpenKeyW
RegEnumValueW
RegQueryInfoKeyW
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExW
RegCreateKeyExW
RegDeleteKeyW
RegReplaceKeyA
RegQueryValueA
RegReplaceKeyW
RegGetKeySecurity
RegOpenKeyExW
RegFlushKey
RegQueryInfoKeyW
RegDeleteKeyA
RegQueryInfoKeyA
RegGetKeySecurity
RegLoadKeyW
RegEnumValueW
RegOpenKeyA
RegDeleteValueA
RegEnumKeyExW
RegEnumValueA
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegEnumKeyA
RegQueryValueW
RegLoadKeyA
RegCreateKeyW
RegCreateKeyExA
Sections
.itext Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 103KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ