Static task
static1
Behavioral task
behavioral1
Sample
38b6b44b7c1468fc0c11753ce9f02bc43ed11d9eb42d81de6d815aafb97d567d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38b6b44b7c1468fc0c11753ce9f02bc43ed11d9eb42d81de6d815aafb97d567d.exe
Resource
win10v2004-20240802-en
General
-
Target
38b6b44b7c1468fc0c11753ce9f02bc43ed11d9eb42d81de6d815aafb97d567d
-
Size
156KB
-
MD5
a1afe2e1b5931256fca9c92387aec41a
-
SHA1
c63d5e78174f4025370449b5b162edde7b33991a
-
SHA256
38b6b44b7c1468fc0c11753ce9f02bc43ed11d9eb42d81de6d815aafb97d567d
-
SHA512
1fd8a8e8bf80b6b24f980c02ec10e08f7fd01ab44374b765858cd194d7a200b622c6e1dd9e4a5cdcec5a9be45b109e965065614bee5405b8686997397e403670
-
SSDEEP
1536:eBeq9epzMzUQJIY5EZsM3uPJC7QTtqKvQxADKVArxhoJM:EPWzCNJI6FM3oERADKQhoJM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38b6b44b7c1468fc0c11753ce9f02bc43ed11d9eb42d81de6d815aafb97d567d
Files
-
38b6b44b7c1468fc0c11753ce9f02bc43ed11d9eb42d81de6d815aafb97d567d.exe windows:5 windows x86 arch:x86
a855b091c0ae4ce0295af763a5576704
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapFree
HeapAlloc
GetProcessHeap
ReadFile
LocalAlloc
GetAtomNameA
GetFileSize
GetThreadPriorityBoost
CreateFileA
GetModuleFileNameA
OpenEventW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
user32
LoadCursorA
CreateWindowExA
ShowWindow
UpdateWindow
RegisterClassExA
LoadIconA
msvcr90
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_amsg_exit
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
_crt_debugger_hook
?terminate@@YAXXZ
strcpy
??3@YAXPAX@Z
_initterm
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ