Static task
static1
Behavioral task
behavioral1
Sample
3fb850281905e7698ea41807944a2a0a66d61345e54d994bb2af61d4914aeb0d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3fb850281905e7698ea41807944a2a0a66d61345e54d994bb2af61d4914aeb0d.exe
Resource
win10v2004-20230221-en
General
-
Target
3fb850281905e7698ea41807944a2a0a66d61345e54d994bb2af61d4914aeb0d
-
Size
292KB
-
MD5
d4a24903f4e53a4b68085ede4aeb50c3
-
SHA1
7dc7289932fcd7c8255b719949cf7741ca31cde5
-
SHA256
3fb850281905e7698ea41807944a2a0a66d61345e54d994bb2af61d4914aeb0d
-
SHA512
fce781b3ef3ea4f0778b70645d2225989b8701fc8b9a7541485df43dc5d3a7551b7e3ca2282b0a681d815c9e22d827273bab7fee5c09db741e27855545c6b8d8
-
SSDEEP
6144:hLPDgjcZOKKKKK1buNh6vPcQ8xzQoC2K:hvgjcaYPcQ8xzQoC2K
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3fb850281905e7698ea41807944a2a0a66d61345e54d994bb2af61d4914aeb0d
Files
-
3fb850281905e7698ea41807944a2a0a66d61345e54d994bb2af61d4914aeb0d.exe windows x86
e40167faf1a5cfd5b5083d522a1f6878
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetNumberOfConsoleInputEvents
GetConsoleAliasExesLengthA
InterlockedIncrement
SystemTimeToFileTime
EnumCalendarInfoW
SetDefaultCommConfigW
GetProfileSectionA
SetComputerNameW
CallNamedPipeW
MoveFileWithProgressA
GetTickCount
ReadConsoleW
SetCommState
GetDriveTypeA
SetHandleCount
GetVolumePathNameW
GetPrivateProfileIntA
LoadLibraryW
IsProcessInJob
FreeConsole
InterlockedPopEntrySList
GetFileAttributesW
CreateFileW
GetOverlappedResult
CompareStringW
GetStringTypeExA
EnumSystemLocalesA
GetProfileIntA
ReleaseActCtx
GetStdHandle
GetCurrentDirectoryW
GetProcAddress
BeginUpdateResourceW
SetFirmwareEnvironmentVariableW
RemoveDirectoryA
VerLanguageNameW
SearchPathA
PrepareTape
GetTempFileNameA
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
LocalAlloc
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
AddAtomA
GlobalWire
GetModuleFileNameA
FindNextFileA
EnumDateFormatsA
GetModuleHandleA
SetLocaleInfoW
lstrcatW
FreeEnvironmentStringsW
GetConsoleTitleW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
GlobalReAlloc
EnumSystemLocalesW
AreFileApisANSI
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapFree
HeapAlloc
DeleteFileA
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetModuleFileNameW
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
CloseHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetEnvironmentStringsW
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
WriteConsoleW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dugev Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ