Static task
static1
Behavioral task
behavioral1
Sample
37eefcda0da971555fd77628568b23cf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37eefcda0da971555fd77628568b23cf.exe
Resource
win10v2004-20231215-en
General
-
Target
37eefcda0da971555fd77628568b23cf
-
Size
415KB
-
MD5
37eefcda0da971555fd77628568b23cf
-
SHA1
0b8a8170c41dbaac6774f344c9ca0e1e1831daa9
-
SHA256
f76a883adf60b96e736a6493820cc3eea434bd4a4ef03883059fd6f8936ac56a
-
SHA512
19cbacdb244290ba6888c48798bc7c5976f0c4d4a03c7a291b82b5689cb517dd42d1d09a8035ad81e62ffa0f2887d1a508abf5a1650900292cb826f41c88d87c
-
SSDEEP
6144:KRYfJ2YOuh7PspMoIkJ/YeBkw0FQMNue1R4OpOU1UMJVdTCd0Y4o9XwMs98vu/3/:lQXuh7PsLfJ/1BkrlQgRE9akWhMsiA/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37eefcda0da971555fd77628568b23cf
Files
-
37eefcda0da971555fd77628568b23cf.exe windows:4 windows x86 arch:x86
4af4b056c6e7d18d72f1d858a05899dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
GetProcessShutdownParameters
IsBadWritePtr
OpenEventA
RtlUnwind
GetStdHandle
MapViewOfFileEx
GetCurrentProcess
GetLocaleInfoW
VirtualAlloc
LCMapStringA
HeapSize
HeapReAlloc
GetEnvironmentStrings
CompareStringW
GetDateFormatA
EnumSystemLocalesA
IsValidLocale
GetModuleFileNameA
FreeEnvironmentStringsW
GetStartupInfoW
ExitProcess
GetCommandLineA
GetStartupInfoA
GetSystemInfo
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetModuleFileNameW
DeleteCriticalSection
GetUserDefaultLCID
QueryPerformanceCounter
TlsSetValue
SetEnvironmentVariableA
CreateToolhelp32Snapshot
MultiByteToWideChar
TlsFree
CompareStringA
HeapAlloc
GetLastError
HeapFree
VirtualUnlock
LCMapStringW
GetCurrentProcessId
ConvertDefaultLocale
GetStringTypeA
GetOEMCP
SetLastError
GetTimeZoneInformation
CloseHandle
GetCommandLineW
GetStringTypeW
FreeEnvironmentStringsA
VirtualProtect
SetHandleCount
WriteConsoleInputA
SleepEx
WriteFile
WideCharToMultiByte
VirtualFree
GetEnvironmentStringsW
GetCurrencyFormatA
LeaveCriticalSection
RtlZeroMemory
GlobalGetAtomNameA
GetConsoleScreenBufferInfo
GetTimeFormatA
GetProcAddress
GetCurrentThread
GetFileType
FreeLibraryAndExitThread
InitializeCriticalSection
InterlockedExchange
GetVersionExA
UnhandledExceptionFilter
GetLocaleInfoA
VirtualQuery
TlsGetValue
TlsAlloc
EnterCriticalSection
IsValidCodePage
GetCurrentThreadId
HeapCreate
WriteProfileStringW
TerminateProcess
GetCPInfo
HeapDestroy
OpenFileMappingA
GetModuleHandleA
shell32
DoEnvironmentSubstA
ExtractIconExW
FindExecutableA
SHGetSpecialFolderPathA
SHBrowseForFolderA
SHUpdateRecycleBinIcon
DuplicateIcon
InternalExtractIconListA
CheckEscapesW
ExtractIconA
ShellHookProc
FreeIconList
CommandLineToArgvW
SHFormatDrive
SHGetFileInfo
SHGetPathFromIDListA
ExtractAssociatedIconExW
SHEmptyRecycleBinA
SHGetSpecialFolderPathW
RealShellExecuteExA
SHBrowseForFolder
SHQueryRecycleBinW
ExtractAssociatedIconExA
wininet
FtpRenameFileW
GetUrlCacheEntryInfoExA
FtpDeleteFileA
InternetCombineUrlW
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ