Static task
static1
Behavioral task
behavioral1
Sample
38bb5911dfef5ae48cedcce19468d760N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38bb5911dfef5ae48cedcce19468d760N.exe
Resource
win10v2004-20240802-en
General
-
Target
38bb5911dfef5ae48cedcce19468d760N.exe
-
Size
5.2MB
-
MD5
38bb5911dfef5ae48cedcce19468d760
-
SHA1
de0909bbef7e1b13613ffc7c26bad65cf8c7df41
-
SHA256
8cd83122a02883ac8ab0f2360e3e9a6b1f7ed92e8fe3b474667eb24b0ef2560b
-
SHA512
4d0ff7dac983d637c265ff939dc042b863f2cff8301599d24d91bdf3d612e0973b6616e8ae37c50507d31d49130a5005598c29189e9086126a83f877709c2a62
-
SSDEEP
98304:etoShOt30GnyEgqpKlQ5UjFSTnzBEtNt66dkWGCXDKr4:etZu3FKkfazZy4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38bb5911dfef5ae48cedcce19468d760N.exe
Files
-
38bb5911dfef5ae48cedcce19468d760N.exe.exe windows:4 windows x86 arch:x86
32a34e37173c05391421f2b17d59fe59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
Imports
comctl32
ord17
kernel32
GlobalLock
GlobalReAlloc
GlobalUnlock
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LoadLibraryExA
LoadResource
LocalFree
LockResource
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
MapViewOfFile
MoveFileA
MulDiv
MultiByteToWideChar
RaiseException
ReadFile
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetThreadLocale
SizeofResource
GlobalHandle
SuspendThread
TerminateThread
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
LocalAlloc
IsValidCodePage
CreateEventW
LoadLibraryA
LeaveCriticalSection
GetTickCount
EnterCriticalSection
InitializeCriticalSection
GetCommandLineA
CreateProcessW
CreateFileMappingA
CreateFileW
CreateThread
DeleteCriticalSection
DeleteFileA
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetVersion
GetThreadLocale
GetTempPathA
GetSystemInfo
GetSystemDirectoryA
GetStringTypeExA
GetStdHandle
GetStartupInfoA
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLocaleInfoA
GetLastError
GetFullPathNameA
GetFileType
GetFileSize
GetFileAttributesA
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCPInfo
GetACP
FreeResource
FreeLibrary
FormatMessageA
FlushViewOfFile
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnumCalendarInfoA
Sleep
user32
IsIconic
IsRectEmpty
IsWindowEnabled
IsWindowVisible
IsZoomed
KillTimer
LoadBitmapA
LoadCursorA
LoadIconA
LoadImageA
LoadKeyboardLayoutA
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MsgWaitForMultipleObjects
OemToCharA
OffsetRect
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowRgn
SetWindowsHookExA
SetWindowTextA
ShowCursor
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WaitMessage
WindowFromDC
WindowFromPoint
WinHelpA
IsDialogMessageA
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongA
GetWindowDC
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetParent
GetMessagePos
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardType
GetKeyboardState
GetKeyboardLayoutList
GetIconInfo
GetForegroundWindow
GetFocus
GetDlgItem
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageA
DestroyWindow
MessageBoxA
CharToOemA
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
CharUpperBuffA
CheckMenuItem
ChildWindowFromPoint
ClientToScreen
CloseClipboard
CopyImage
CreateIcon
IsChild
InvalidateRect
IntersectRect
InsertMenuA
InsertMenuItemA
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
GetTopWindow
gdi32
ExtTextOutA
GdiFlush
GetBitmapBits
GetBrushOrgEx
GetClipBox
GetCurrentPositionEx
GetDCOrgEx
GetDeviceCaps
GetDIBColorTable
GetDIBits
GetEnhMetaFileBits
GetEnhMetaFileHeader
GetObjectA
GetPaletteEntries
GetPixel
GetRgnBox
GetStockObject
GetSystemPaletteEntries
GetTextExtentPoint32A
GetTextExtentPointA
GetTextMetricsA
GetViewportOrgEx
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
ExcludeClipRect
MoveToEx
PatBlt
PlayEnhMetaFile
Polyline
RealizePalette
Rectangle
RectVisible
RestoreDC
SaveDC
SelectClipRgn
SelectObject
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetDIBColorTable
SetEnhMetaFileBits
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StretchBlt
UnrealizeObject
DeleteObject
DeleteEnhMetaFile
DeleteDC
MaskBlt
CreateSolidBrush
winspool.drv
StartPagePrinter
advapi32
SetSecurityDescriptorDacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
ole32
CoUninitialize
CoInitialize
CoCreateInstance
StringFromCLSID
CoTaskMemAlloc
CoTaskMemFree
oleaut32
VariantCopyInd
VariantClear
VariantChangeType
VariantInit
msvcrt
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_hcore_9 Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 848KB - Virtual size: 844KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_icore_9 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE