Static task
static1
Behavioral task
behavioral1
Sample
d36a4cf1efd2c85575ec295721c51cb0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d36a4cf1efd2c85575ec295721c51cb0.exe
Resource
win10v2004-20240226-en
General
-
Target
d36a4cf1efd2c85575ec295721c51cb0
-
Size
91KB
-
MD5
d36a4cf1efd2c85575ec295721c51cb0
-
SHA1
6425151bef3c305a15f45e793596ad74b4fb69f3
-
SHA256
6b4a6cdeed46f606032766ac2fa8f59ba30a41aede67b6e5502e6c832e74eae5
-
SHA512
562879fcf642144b7c81d877cd68ffc49375ee67ecd6b3406fc1da853a94aaffeb9a845dbce5760c84aa198c34bebd8bd7c031d1475f46ffc4286dd0625bd703
-
SSDEEP
1536:XUuejfBj8VgcKsAnuW6geKuwPm4Pk1yIygOdSjFjNjttyNlBampMdvaWDjFY:XqfiKcKsAnuWxqwm4gTfOdSdFyWfG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d36a4cf1efd2c85575ec295721c51cb0
Files
-
d36a4cf1efd2c85575ec295721c51cb0.exe windows:4 windows x86 arch:x86
30484ba80e636a1e6fa228edc548cf49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetProcessHeap
GlobalUnlock
LoadLibraryExA
GetEnvironmentVariableA
GlobalFree
CreateFileA
TlsGetValue
FindResourceA
HeapCreate
lstrlenW
CloseHandle
TlsAlloc
DeleteAtom
SetLastError
CreateMutexA
GetExitCodeProcess
GetModuleHandleA
GetStdHandle
ReleaseMutex
user32
CallWindowProcA
FillRect
DrawMenuBar
SetFocus
CreateWindowExA
IsWindow
GetDC
GetDlgItem
CreateMenu
CheckRadioButton
GetCaretPos
DispatchMessageA
DrawEdge
rsaenh
CPDecrypt
CPGenKey
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE