Static task
static1
Behavioral task
behavioral1
Sample
39870566ed97c86b716d4b64cb9e3b7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39870566ed97c86b716d4b64cb9e3b7f.exe
Resource
win10v2004-20231222-en
General
-
Target
39870566ed97c86b716d4b64cb9e3b7f
-
Size
160KB
-
MD5
39870566ed97c86b716d4b64cb9e3b7f
-
SHA1
abe0173045d7c3d6274e66a1cc977328da4af986
-
SHA256
7e23ca47077de5c377e7c94148894abca24bd0b5a09b2551b573d5b1655034f8
-
SHA512
593160c03cb52b8ba045675cc50fbdbacaadebc50f7df2221ab023c37b8c7e67c3bbd8c16fabc441d6193771c668b348e8f63b06de0fd2e3de483badf8421788
-
SSDEEP
3072:NLQq7Dy7oXP5KdDsCyrhsMxZ6m3Nv82XU+vyIkR7F1H0o/K:Ft7DyU/GwTtsJmdk2XUJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39870566ed97c86b716d4b64cb9e3b7f
Files
-
39870566ed97c86b716d4b64cb9e3b7f.exe windows:4 windows x86 arch:x86
0270dc2dcf24681318b6423b9efd1f00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateThread
SetThreadPriority
lstrcmpiA
CreateProcessW
SetConsoleCP
GetPrivateProfileSectionNamesA
CreateMailslotA
PurgeComm
CompareFileTime
GetFileSizeEx
WideCharToMultiByte
Sleep
CreateNamedPipeA
SetFilePointer
user32
LoadBitmapW
DrawFrameControl
DdeInitializeW
CopyIcon
gdi32
SetMapperFlags
EndPage
GetRgnBox
GetROP2
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE