Static task
static1
Behavioral task
behavioral1
Sample
39a462c20e9f1a24ee242678bed903ae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39a462c20e9f1a24ee242678bed903ae.exe
Resource
win10v2004-20231215-en
General
-
Target
39a462c20e9f1a24ee242678bed903ae
-
Size
438KB
-
MD5
39a462c20e9f1a24ee242678bed903ae
-
SHA1
d68a555a065bbd1768c6d93eed0df2864a3f0738
-
SHA256
3cf6c5dcd89aaad88126bda2c070d95a5344e6f6bef9b85dc4cb208f1e7603ad
-
SHA512
7b661f491b8b18c686ec84fd22b5a88201a342355f0d8d0210977a638c0cfb13b0e315f883f73cc2f1e911f07ab14f67e951bf668c0608056e57a5b4381f8121
-
SSDEEP
12288:I4laFvPGvVF5+L5bs5HYhwnMb2QSqmWBmNB7lutO7v:IzPGvVb+LOmhQM6EJ0BL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39a462c20e9f1a24ee242678bed903ae
Files
-
39a462c20e9f1a24ee242678bed903ae.exe windows:4 windows x86 arch:x86
ad9c989381aa361d1026a37ccc6be0ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragQueryFile
FreeIconList
SheChangeDirExW
RealShellExecuteA
ShellAboutW
SHAppBarMessage
SHGetDataFromIDListW
SHGetNewLinkInfo
ExtractIconExA
SHEmptyRecycleBinA
RealShellExecuteExW
DragQueryFileAorW
DoEnvironmentSubstW
DoEnvironmentSubstA
SHGetMalloc
SHBrowseForFolderA
ExtractAssociatedIconExW
DragQueryFileW
ExtractAssociatedIconA
SHQueryRecycleBinW
ExtractAssociatedIconExA
ExtractIconW
DragAcceptFiles
SHInvokePrinterCommandW
SHGetDiskFreeSpaceA
advapi32
LookupPrivilegeDisplayNameA
LookupPrivilegeValueW
LookupAccountSidW
LookupPrivilegeNameW
CryptAcquireContextW
RegOpenKeyW
CryptEnumProviderTypesA
CryptContextAddRef
RegEnumKeyExW
wininet
InternetCanonicalizeUrlW
SetUrlCacheGroupAttributeA
DetectAutoProxyUrl
HttpQueryInfoW
InternetShowSecurityInfoByURL
InternetTimeToSystemTimeW
HttpEndRequestW
CreateUrlCacheEntryA
InternetFindNextFileA
InternetInitializeAutoProxyDll
FtpOpenFileW
ShowX509EncodedCertificate
HttpSendRequestA
CreateUrlCacheEntryW
GopherFindFirstFileW
UnlockUrlCacheEntryStream
FreeUrlCacheSpaceA
user32
LoadKeyboardLayoutW
GetScrollInfo
GetWindowContextHelpId
PaintDesktop
CharUpperBuffA
GetPropW
SendInput
CharLowerBuffA
GetParent
LoadCursorW
CascadeWindows
ReplyMessage
EditWndProc
EnumDisplaySettingsW
CreateIconIndirect
CheckMenuItem
SendMessageTimeoutA
InsertMenuItemW
IsDlgButtonChecked
ShowWindow
GetClipboardFormatNameA
SetCursor
DefFrameProcW
SetUserObjectSecurity
kernel32
GetEnvironmentStringsW
CompareStringW
GetDateFormatA
UnhandledExceptionFilter
GetFileAttributesExA
GetTickCount
HeapFree
GetOEMCP
CompareStringA
IsValidLocale
SetUnhandledExceptionFilter
SetHandleCount
HeapDestroy
GetLastError
VirtualFree
HeapCreate
GetEnvironmentStrings
InterlockedDecrement
LoadLibraryW
GetModuleFileNameW
HeapAlloc
GetLocaleInfoW
SetEnvironmentVariableA
GetFileType
TlsFree
GetFileTime
GetACP
TlsSetValue
FreeEnvironmentStringsA
TerminateProcess
GetModuleHandleA
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
FreeEnvironmentStringsW
DeleteCriticalSection
FreeLibrary
GetSystemTimeAsFileTime
RtlUnwind
TlsAlloc
ExitProcess
GetCurrentThreadId
EnterCriticalSection
VirtualAlloc
GetComputerNameW
HeapSize
GetCommandLineA
MultiByteToWideChar
GetCurrentProcessId
GetProcessHeap
WriteConsoleInputA
VirtualQuery
LCMapStringW
GetProcAddress
GetUserDefaultLCID
InterlockedIncrement
HeapReAlloc
GetModuleFileNameA
Sleep
GetLocaleInfoA
GetStdHandle
GetCurrentThread
LCMapStringA
GetTimeZoneInformation
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcess
IsValidCodePage
GetVersionExA
GetCommandLineW
IsDebuggerPresent
WideCharToMultiByte
GetStringTypeW
GetStartupInfoW
GetStringTypeA
SetConsoleCtrlHandler
EnumSystemLocalesA
SetLastError
TlsGetValue
GetTimeFormatA
GetCPInfo
LeaveCriticalSection
WriteFile
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 275KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ