Static task
static1
Behavioral task
behavioral1
Sample
382f1884b9c45d7dcc7c0f3bd76874cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
382f1884b9c45d7dcc7c0f3bd76874cc.exe
Resource
win10v2004-20231222-en
General
-
Target
382f1884b9c45d7dcc7c0f3bd76874cc
-
Size
391KB
-
MD5
382f1884b9c45d7dcc7c0f3bd76874cc
-
SHA1
fdb393ab0b80c494f14e4f613cfeba9f4ce8e6bf
-
SHA256
7e34b12f7a12a1c07ebe0d4c6e40725fedd28224aa168f1c1e2eaa79842b9915
-
SHA512
11cbff0d461fcfa7c96acbd5341f3825f4b42f0cdda41edd980167d96fc9dbb4c2ebd049726c1dd6296e5b53f118eb18c15683eb15c3341680d3c5672a65f9c1
-
SSDEEP
6144:a1C+FxAgek1C3EpduJFYRjTuaJfrv/0wEfYC9TbyrMiMDeEic2U9uKZE89qx1:a1xFe6CFkZZVryf9RlDLiPUwKLqx1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 382f1884b9c45d7dcc7c0f3bd76874cc
Files
-
382f1884b9c45d7dcc7c0f3bd76874cc.exe windows:4 windows x86 arch:x86
8d1a9a6fc1f7b9a2f86651a0ba1d24f6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateFileA
GetConsoleCP
GetACP
FreeEnvironmentStringsA
GetConsoleAliasA
TlsGetValue
LocalLock
GetCalendarInfoA
LocalUnlock
HeapCreate
LocalFree
FindAtomA
FindClose
CloseHandle
CreateFileMappingA
WaitForSingleObject
GetModuleHandleA
IsDebuggerPresent
LoadLibraryExA
user32
SetFocus
DrawEdge
GetIconInfo
DefWindowProcA
DispatchMessageA
IsWindow
GetDlgItem
CascadeWindows
GetMessageA
GetDC
DrawTextA
CallWindowProcA
CreateDialogParamA
DrawIconEx
msasn1
ASN1BERDecEoid
ASN1BERDecBool
ASN1BEREncLength
ASN1BEREncFlush
ASN1BERDecCheck
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ