Static task
static1
Behavioral task
behavioral1
Sample
39390ac97819caa0e6969ea39537d7a3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39390ac97819caa0e6969ea39537d7a3.exe
Resource
win10v2004-20231215-en
General
-
Target
39390ac97819caa0e6969ea39537d7a3
-
Size
236KB
-
MD5
39390ac97819caa0e6969ea39537d7a3
-
SHA1
598c699a68d3fef466372d762e500b39267f5a89
-
SHA256
e8b7a9704f582f0e7b422ef7f7e290b4ea1656a329114d58b9346a068c55fd5c
-
SHA512
b1ef1ff2c19674649fc4ecc5b2d905b5cd6607f820b8c84face7225a75ab76b30fc8d5bece5912004580abcee767d119350f51419d7a3b4a2dd7776a37c88ef0
-
SSDEEP
6144:pwZSTUSG6B6JnO43tdST5vmWchbnjtTBpY7Vp:pDUSG6BfeH21m7jtT8Vp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39390ac97819caa0e6969ea39537d7a3
Files
-
39390ac97819caa0e6969ea39537d7a3.exe windows:4 windows x86 arch:x86
e2c5027c53d11a8920e1e39a720c1a4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
WSASend
WSACleanup
WSAStartup
gethostbyname
gethostname
closesocket
WSAIoctl
socket
bind
htons
sendto
recv
send
connect
shutdown
getsockname
recvfrom
WSAGetLastError
ntohs
kernel32
SetEvent
DeleteFileA
ReadFile
CreateFileA
GetTempPathA
GetProcAddress
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
FindClose
FindFirstFileA
CreateEventA
TerminateThread
WaitForSingleObject
CreateThread
WriteFile
ResetEvent
WaitForMultipleObjects
OpenEventA
GetShortPathNameA
OpenProcess
CreateDirectoryA
GetFileSize
GetTickCount
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
GlobalAlloc
GlobalFree
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateIoCompletionPort
CloseHandle
GetModuleFileNameA
GetExitCodeThread
HeapLock
HeapWalk
HeapUnlock
HeapFree
GlobalHandle
GetSystemTime
FreeResource
Sleep
GetStartupInfoA
SetFilePointer
HeapAlloc
HeapDestroy
HeapCreate
GetExitCodeProcess
CreatePipe
GetCurrentProcess
DuplicateHandle
GetDriveTypeA
GetVolumeInformationA
GetLongPathNameA
GetCurrentProcessId
FindNextFileA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateProcessA
user32
GetMessageA
PostThreadMessageA
ModifyMenuA
GetWindowTextA
IsRectEmpty
GrayStringA
GetMenuInfo
GetWindowLongA
GetWindowThreadProcessId
MessageBoxA
PostMessageA
IsWindow
SendMessageA
DestroyWindow
GetSystemMetrics
FindWindowA
GetWindow
GetDesktopWindow
gdi32
GetObjectA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateDCA
GetMapMode
EnumObjects
GetDIBits
shell32
SHFileOperationA
ShellExecuteA
Shell_NotifyIconA
ole32
GetClassFile
CoFreeAllLibraries
CoUninitialize
CoCreateGuid
CoInitialize
StringFromGUID2
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipAlloc
GdipFree
GdipLoadImageFromFile
GdipSaveImageToFile
GdipDisposeImage
GdipGetImageEncodersSize
GdipGetImageEncoders
mfc42
ord1641
ord1640
ord323
ord800
ord1601
ord537
ord354
ord5186
ord1979
ord665
ord640
ord2414
ord3626
ord3663
ord3571
ord5785
msvcrt
strcmp
strstr
memset
_CxxThrowException
strrchr
memcpy
strchr
memcmp
srand
rand
__CxxFrameHandler
_purecall
malloc
pow
free
wcscmp
_strupr
_strset
_iob
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
__dllonexit
_onexit
_controlfp
sprintf
strcpy
strlen
strncpy
strcat
strncat
setvbuf
fprintf
fflush
_ftol
Sections
.text Size: 188KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ