Static task
static1
Behavioral task
behavioral1
Sample
380486e8bb35517faacdd8cf30acfac6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
380486e8bb35517faacdd8cf30acfac6.exe
Resource
win10v2004-20231215-en
General
-
Target
380486e8bb35517faacdd8cf30acfac6
-
Size
67KB
-
MD5
380486e8bb35517faacdd8cf30acfac6
-
SHA1
8c746c190741654f8d834119a88065b3829f06d0
-
SHA256
2acb0b7a08e19bd2b4229ca8fd6fccfaf6b76a1486a2a7642faf367743754ad3
-
SHA512
3c4600bd3a4cb82394ee4f4599f8f7d5687a9c457c7ba33b89b74d619c1e6d40d42f3f1377dc26c8163f600598205bff567f8eafc6ec1b8c2ec22708baa65841
-
SSDEEP
1536:pvQSlA615AyQm/moG7cVF1tqEQX98DbowIBtV5oi/EqF6Moi:pIeAy7NGIVFpeJo+5ai
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 380486e8bb35517faacdd8cf30acfac6
Files
-
380486e8bb35517faacdd8cf30acfac6.exe windows:4 windows x86 arch:x86
342e9dbaf86e88f4cdc1cff3f8d9fb99
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
OemToCharBuffA
MessageBoxA
MessageBeep
LoadCursorFromFileA
LoadCursorA
EndPaint
EndDialog
EmptyClipboard
DrawTextA
DestroyCursor
CreateIconFromResourceEx
CreateDesktopA
CopyRect
CharToOemBuffA
CharNextA
ActivateKeyboardLayout
kernel32
lstrcmpiA
ReadFile
MapViewOfFile
InitializeCriticalSection
GetVersionExA
GetSystemTimeAsFileTime
GetStartupInfoA
GetModuleHandleA
ExitProcess
EnumResourceTypesA
EnumResourceLanguagesA
CloseHandle
advapi32
RegQueryValueA
RegOpenKeyExA
RegCloseKey
Sections
.text Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ