Static task
static1
Behavioral task
behavioral1
Sample
37f01106808cefef8e46aef81af8bc31.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37f01106808cefef8e46aef81af8bc31.exe
Resource
win10v2004-20231215-en
General
-
Target
37f01106808cefef8e46aef81af8bc31
-
Size
37KB
-
MD5
37f01106808cefef8e46aef81af8bc31
-
SHA1
051fa8c935a45ce01545e4c09915c87de5f496a6
-
SHA256
b963cb85146b16e14e4f27ff9556c3c78254faa5beee69681fb308d223f56131
-
SHA512
7dffddca4d08ff0cd9784f6505f0657f973e323c069defca1cb5a4d39fb92f1294bd55e496ab70e55ac85f4bc8afe883ba94d4b86eb312f91bd05674ba42b418
-
SSDEEP
768:1/1BYhnP3wRzvFTNhW9vApIZdjoJ1jVtWFm3wI8J9slJqJD:B1bs9I+3+B7AI83e0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37f01106808cefef8e46aef81af8bc31
Files
-
37f01106808cefef8e46aef81af8bc31.exe windows:4 windows x86 arch:x86
9333981c50d77480e525111eee4463c3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateFileA
LockResource
LoadResource
SizeofResource
FindResourceA
GetModuleHandleA
UnmapViewOfFile
FlushViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
Sleep
DeleteFileA
TerminateProcess
OpenProcess
WinExec
GetCurrentProcessId
CopyFileA
GetTempFileNameA
GetTempPathA
GetWindowsDirectoryA
GetModuleFileNameA
shlwapi
PathFileExistsA
msvcrt
_onexit
__dllonexit
time
_mbsupr
sprintf
strcat
_ltoa
strlen
atoi
_mbsrchr
_except_handler3
_exit
_XcptFilter
exit
__p___initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
rpcrt4
UuidCreate
RpcStringFreeA
UuidToStringA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 286B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ