Static task
static1
Behavioral task
behavioral1
Sample
d39ccb1d7a161094e2483515502a4ad8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d39ccb1d7a161094e2483515502a4ad8.exe
Resource
win10v2004-20240226-en
General
-
Target
d39ccb1d7a161094e2483515502a4ad8
-
Size
40KB
-
MD5
d39ccb1d7a161094e2483515502a4ad8
-
SHA1
a6dfc3e8c8abc1f53c331bd0c3621b26df1eb09a
-
SHA256
5a66347b15c23cf7ad64fb85b4bd5e26b876088d33b20919e23667cfff687cd4
-
SHA512
9579e41755a703c9200a8e3badd2e46d88f6cf35dbddc314460be181c09616ff805ac8fb464ae326ba17d2239f1511f347022db830577e4ca4e07ca876def3a8
-
SSDEEP
768:d57ldq+OJ14V0+Z7QwEW6bTJWHC6ihsXLJuZDxLx0Erl:zxdjOJE0L/bAHmhsXLJuvqWl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d39ccb1d7a161094e2483515502a4ad8
Files
-
d39ccb1d7a161094e2483515502a4ad8.exe windows:4 windows x86 arch:x86
d74727d98e8b4039b16b56873ed5056b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
OpenEventA
WaitForSingleObject
CreateEventA
Sleep
CreateThread
MoveFileExA
GetModuleFileNameA
CreateMutexA
GetVersionExA
HeapFree
HeapReAlloc
HeapAlloc
HeapSize
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
InitializeCriticalSection
user32
EnumWindows
GetWindowTextA
GetDlgItem
IsWindowVisible
ShowWindow
GetDlgCtrlID
SendMessageA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE