Static task
static1
Behavioral task
behavioral1
Sample
138d337dcb0adb1c0d58cf9d9475e1b1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
138d337dcb0adb1c0d58cf9d9475e1b1.exe
Resource
win10v2004-20240508-en
General
-
Target
138d337dcb0adb1c0d58cf9d9475e1b1.bin
-
Size
49KB
-
MD5
138d337dcb0adb1c0d58cf9d9475e1b1
-
SHA1
64fa96b8a83f6984b4bf030a100e5ec632ded6e2
-
SHA256
34aa6a6f3438cdb71259ccf36e19731713942df5ed24ff499cf85881c5dd4414
-
SHA512
48f42051379286e4bc6aab95175e27f127f323d67be9e3695d8ed3fdba1fe575ee0fcbde33d605b382c003fe765b679bcdcaa86001569d4e14fe848baadbcaeb
-
SSDEEP
768:vKO/JO2qcfL+8lcbnVUQMirpJw62+haOwW/bLE26G6ND4SIfyzCU9ZB:b/Q2xy8CbVvR/QVWPEJtN+f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 138d337dcb0adb1c0d58cf9d9475e1b1.bin
Files
-
138d337dcb0adb1c0d58cf9d9475e1b1.bin.exe windows:5 windows x86 arch:x86
8ef21e0fa689263152916ca314e044e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageW
EndDialog
OpenWindowStationA
GetDlgItemTextW
GetIconInfo
DrawIcon
ToUnicode
FindWindowExW
SetThreadDesktop
GetKeyboardState
PeekMessageW
MsgWaitForMultipleObjects
GetDlgItem
GetWindowLongW
ExitWindowsEx
GetDlgItemTextA
GetClipboardData
GetForegroundWindow
LoadCursorW
DispatchMessageW
GetMessageA
CloseDesktop
PeekMessageA
GetCursorPos
GetClassNameW
SetProcessWindowStation
OpenDesktopA
GetKeyState
GetWindowTextW
CharLowerBuffA
CloseWindowStation
GetWindowThreadProcessId
SendMessageW
kernel32
GetComputerNameW
SetEvent
GetProcessTimes
LeaveCriticalSection
lstrcmpiW
ReleaseMutex
CreateDirectoryW
HeapAlloc
GlobalUnlock
lstrlenA
ResetEvent
MoveFileExW
WideCharToMultiByte
EnterCriticalSection
GetFileSize
GetThreadPriority
lstrcmpiA
FindFirstFileW
GetCommandLineA
lstrcatW
HeapReAlloc
GetSystemTimeAsFileTime
GetTickCount
SetFileTime
SystemTimeToFileTime
GetSystemTime
ReadFile
GetUserDefaultUILanguage
GetFileSizeEx
GetLocalTime
FindResourceW
MapViewOfFile
IsBadReadPtr
CreateThread
WriteFile
FindClose
GetVersionExW
GetProcessHeap
GetLogicalDrives
GetTempPathW
DeleteFileW
CreateEventW
GetTimeZoneInformation
UnmapViewOfFile
GetCurrentThreadId
CopyFileW
SetFilePointer
CreateFileMappingW
SetThreadPriority
SetFileAttributesW
lstrcpyA
lstrcpyW
GetModuleFileNameW
lstrcatA
GetModuleFileNameA
CreateProcessW
OpenMutexW
GetTempFileNameW
Sections
.erwh Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tuzal Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.izaj Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ