Static task
static1
Behavioral task
behavioral1
Sample
3e14c2d63e2bdde9a18a59b29d7da44fa70339f1ab83a48751fd153e05e1d0f7.exe
Resource
win10-20230703-en
General
-
Target
3e14c2d63e2bdde9a18a59b29d7da44fa70339f1ab83a48751fd153e05e1d0f7
-
Size
787KB
-
MD5
a6b6cce49fd72445479eec6713052fd2
-
SHA1
5036c629666a24f4217069f13709c719f1d6f0cf
-
SHA256
3e14c2d63e2bdde9a18a59b29d7da44fa70339f1ab83a48751fd153e05e1d0f7
-
SHA512
eb919058224c98f9e37508dbafa8258f1beb180bce0373a67cb5fedfe664bf18db0b7b6d14dd58e31bed52d73a05d2ca194a3575690fb2c5e3b3eddf587e207e
-
SSDEEP
12288:Ttqy/KWGUxN0IqYlluXp9fjP38qqZ4TSV9Pc90vBc+YACWZ9YmvVxFV/So3O+d0b:TUIBxN0IqYlWnjP38phjDZNLLh3O+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e14c2d63e2bdde9a18a59b29d7da44fa70339f1ab83a48751fd153e05e1d0f7
Files
-
3e14c2d63e2bdde9a18a59b29d7da44fa70339f1ab83a48751fd153e05e1d0f7.exe windows x86
4c42d56db8a71f86f9ab1a7084ee75c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
SearchPathW
FindResourceA
lstrlenA
WritePrivateProfileStructA
GetConsoleAliasesLengthW
PeekNamedPipe
TlsGetValue
AllocConsole
HeapAlloc
_lwrite
InterlockedDecrement
InterlockedCompareExchange
GetTickCount
FormatMessageA
GlobalAlloc
GetLocaleInfoW
WriteConsoleOutputA
TransactNamedPipe
GetCompressedFileSizeA
CreateActCtxA
SetThreadPriority
DisconnectNamedPipe
GetConsoleAliasesW
GetDateFormatW
OpenMutexW
GetLastError
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
CreateMemoryResourceNotification
SetFileApisToOEM
LoadLibraryA
InterlockedExchangeAdd
DeleteTimerQueue
FindNextChangeNotification
Module32FirstW
EnumResourceTypesW
GetCommTimeouts
UpdateResourceW
GetStringTypeW
OpenSemaphoreW
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ResetWriteWatch
CreateFileA
SetStdHandle
WriteConsoleW
GetProfileIntA
GetComputerNameA
GetConsoleOutputCP
WriteConsoleA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
user32
CharToOemBuffA
CharUpperBuffA
LoadMenuW
CharLowerBuffA
advapi32
InitiateSystemShutdownA
ole32
ReadClassStg
Sections
.text Size: 674KB - Virtual size: 674KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ