Static task
static1
Behavioral task
behavioral1
Sample
37147e8c6a652eadbb0bf7af3741917198b6d0b44ae31adff3301bcf242e4cf2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
37147e8c6a652eadbb0bf7af3741917198b6d0b44ae31adff3301bcf242e4cf2.exe
Resource
win11-20240709-en
General
-
Target
37147e8c6a652eadbb0bf7af3741917198b6d0b44ae31adff3301bcf242e4cf2
-
Size
2.0MB
-
MD5
6d8d9a102d4f2ea6e5b175a737fbb786
-
SHA1
3f06761e2cd97d63543e3ab607703fd483c7000b
-
SHA256
37147e8c6a652eadbb0bf7af3741917198b6d0b44ae31adff3301bcf242e4cf2
-
SHA512
f2c2c33d055f8b0517af75b6253adcc11fccfc1426cd35aa79a3df39ecfcc812bb22fbd7d1b8c64c2182626e6e2b94a7e32621fddba021cb7fa1a9746d3a05ea
-
SSDEEP
49152:/Uidrz+pNKgN4XNKB7HXm3EHmMK+t+Gat+jroQJ1ItRQB5:/pdrzeNKhXNa72l4at+QQJUQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 37147e8c6a652eadbb0bf7af3741917198b6d0b44ae31adff3301bcf242e4cf2
Files
-
37147e8c6a652eadbb0bf7af3741917198b6d0b44ae31adff3301bcf242e4cf2.exe windows:5 windows x86 arch:x86
bb60580c831d0fcfefaccd3e2ac9b432
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
Sections
Size: 73KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 904KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aimzkrrv Size: 724KB - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nmgdibar Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE