Static task
static1
Behavioral task
behavioral1
Sample
37c6e6cc10937a46555291f21f1d046dbf238940edde08ca817d08c7aaf391c8.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
37c6e6cc10937a46555291f21f1d046dbf238940edde08ca817d08c7aaf391c8.exe
Resource
win10v2004-20240226-en
General
-
Target
37c6e6cc10937a46555291f21f1d046dbf238940edde08ca817d08c7aaf391c8
-
Size
370KB
-
MD5
7f61e4726800c88a8f85d5f8d6bdf0bc
-
SHA1
616b8d4b050f3c0169fc5d289a51f7799f457d69
-
SHA256
37c6e6cc10937a46555291f21f1d046dbf238940edde08ca817d08c7aaf391c8
-
SHA512
2644cf300ab314a19b92515c05778b6bafe40368d0d7d6d83e4b6a84d5fade4d247397568c2151a5a28b79ab5022c2ae349b6ece6ba1f4bb6cd212a4019547cf
-
SSDEEP
6144:YZQI+pqoikfTHxW7tYmab2t0PRDpbfKMBphGaW:YZQI+YFkfTHT3TBfKMBpU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 37c6e6cc10937a46555291f21f1d046dbf238940edde08ca817d08c7aaf391c8
Files
-
37c6e6cc10937a46555291f21f1d046dbf238940edde08ca817d08c7aaf391c8.exe windows:5 windows x86 arch:x86
262ebebc1125c68c79c87bc329257c28
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileExW
GetModuleHandleExA
SetLocalTime
BuildCommDCBAndTimeoutsA
CallNamedPipeA
SetUnhandledExceptionFilter
WaitNamedPipeA
GlobalSize
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
SetEvent
BackupSeek
GetModuleHandleW
CreateRemoteThread
SetFileTime
GetWindowsDirectoryA
GetDateFormatA
FindActCtxSectionStringA
GetDriveTypeA
GlobalAlloc
ReadFileScatter
GetVersionExW
DnsHostnameToComputerNameW
GetComputerNameExA
FindNextVolumeW
GetConsoleAliasW
GetFileAttributesW
EnumCalendarInfoA
GetSystemDirectoryA
FindNextVolumeMountPointW
DeactivateActCtx
EnumSystemLocalesA
GetConsoleOutputCP
OpenMutexW
GetProcAddress
LoadLibraryA
LocalAlloc
SetCalendarInfoW
RemoveDirectoryW
GlobalGetAtomNameW
GetCommMask
RtlCaptureStackBackTrace
GlobalFindAtomW
EnumResourceTypesW
FindNextFileA
GetModuleHandleA
SetLocaleInfoW
EraseTape
CreateMutexA
GetStringTypeW
RequestWakeupLatency
GetVolumeNameForVolumeMountPointW
DeleteFileW
GetFileInformationByHandle
CloseHandle
HeapSize
GetModuleFileNameW
lstrcmpA
GetLastError
WideCharToMultiByte
DeleteFileA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
SetLastError
GetCurrentThreadId
GetCurrentThread
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
SetFilePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
FatalAppExitA
Sleep
IsProcessorFeaturePresent
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
RtlUnwind
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
WriteConsoleW
CreateFileW
user32
GetMenu
advapi32
ReportEventA
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 198KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ