Static task
static1
Behavioral task
behavioral1
Sample
37ae42a69a1e3ab547d3b025263cd6aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37ae42a69a1e3ab547d3b025263cd6aa.exe
Resource
win10v2004-20231215-en
General
-
Target
37ae42a69a1e3ab547d3b025263cd6aa
-
Size
80KB
-
MD5
37ae42a69a1e3ab547d3b025263cd6aa
-
SHA1
3a77fef75562599317b2fa680c23169752df98d3
-
SHA256
c642a7916ad50b65dd9d03b56d8c609ae1d7cc6021dc22bb233c1277312b760f
-
SHA512
456a37fb5242e7fdf8a9a1ab8e254e1e1b86587360b718698656c74407d1a81415cb40b489a468b733173e35a05ba46eca6605c38a8687e3f3f9557a9a236655
-
SSDEEP
768:zfFN5YacqZZNEJIpl4PixIb4Dj+jUTywb07YJH4i96CphT+KpYPlLBtD/3KFjBF3:BCqSJm5xR+jUTywg7Y+4QlLTujHs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37ae42a69a1e3ab547d3b025263cd6aa
Files
-
37ae42a69a1e3ab547d3b025263cd6aa.exe windows:4 windows x86 arch:x86
f49f5bf0c48ed18677ce9d08aaa459a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
InterlockedDecrement
GetCurrentThreadId
DeleteFileW
GetFileAttributesW
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
lstrcmpiA
CompareStringA
FlushInstructionCache
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetCPInfo
IsBadCodePtr
TerminateProcess
FlushFileBuffers
SetStdHandle
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
InterlockedIncrement
TlsGetValue
TlsAlloc
TlsSetValue
GetLastError
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapReAlloc
RtlUnwind
ExitProcess
LoadLibraryA
GetProcAddress
SetFilePointer
SetUnhandledExceptionFilter
lstrlenA
HeapFree
HeapAlloc
GetCurrentProcess
IsBadReadPtr
CloseHandle
user32
GetSysColor
MapWindowPoints
SetWindowPos
EndDialog
GetParent
CallWindowProcA
GetFocus
DrawFocusRect
FillRect
GetDlgCtrlID
GetCursorPos
ScreenToClient
SetCursor
EndPaint
BeginPaint
CreateDialogParamA
PtInRect
SetFocus
SetCapture
GetCapture
ReleaseCapture
InvalidateRect
UpdateWindow
DestroyCursor
SetRectEmpty
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
ShowWindow
CharNextA
SetWindowTextA
CreateWindowExA
ReleaseDC
GetDC
DrawTextA
OffsetRect
GetClassNameA
SetWindowLongA
CreateCursor
GetWindowTextA
GetWindowTextLengthA
IsWindow
DestroyWindow
PostQuitMessage
MessageBoxA
GetActiveWindow
DialogBoxParamA
GetSystemMetrics
LoadImageA
SendMessageA
GetDlgItem
EnableWindow
IsDialogMessageA
GetWindowLongA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
IsWindowEnabled
gdi32
SelectObject
DeleteObject
GetObjectA
CreateFontIndirectA
SetTextColor
GetStockObject
DeleteDC
SetBkMode
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
SHSetValueA
StrStrA
SHGetValueA
wnsprintfW
StrStrIA
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ