Static task
static1
Behavioral task
behavioral1
Sample
c3551a57857cf0f5945be8552cc478f34febe5bb425ff717954cad47de7630c5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c3551a57857cf0f5945be8552cc478f34febe5bb425ff717954cad47de7630c5.exe
Resource
win10v2004-20230915-en
General
-
Target
c3551a57857cf0f5945be8552cc478f34febe5bb425ff717954cad47de7630c5
-
Size
298KB
-
MD5
81d43755efe914c51cf48c8336462e73
-
SHA1
ab7a0373cf27338a4cb3bc022660c1e48e9531c1
-
SHA256
c3551a57857cf0f5945be8552cc478f34febe5bb425ff717954cad47de7630c5
-
SHA512
21e1819f7778588ce49e10682778f9f894d694bac20829331dd1a8a36935a0882be37d5b7e4baa7d97e8f7bc41162fb6c792c1bdaaf9ee6972aa50a713fbc7c0
-
SSDEEP
3072:Uvp56mohooruAKOz+hV0jt5W1jQHmdDhpdqH3BWjRzHJhVNUWO8E:oTPoruApz+jSWh1bqHRWjlH7Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c3551a57857cf0f5945be8552cc478f34febe5bb425ff717954cad47de7630c5
Files
-
c3551a57857cf0f5945be8552cc478f34febe5bb425ff717954cad47de7630c5.exe windows:5 windows x86
6d41cb748e4d1fea5be7cc98b4681858
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetDriveTypeW
BuildCommDCBAndTimeoutsA
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
MoveFileExW
InterlockedDecrement
CreateJobObjectW
SetHandleInformation
GetProfileStringW
AddConsoleAliasW
SetVolumeMountPointW
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasExesW
EnumTimeFormatsA
EnumTimeFormatsW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
TerminateThread
FatalAppExitW
GetCalendarInfoW
GetStartupInfoW
CreateMailslotW
RaiseException
GetPrivateProfileIntW
InterlockedExchange
SetLocaleInfoA
SetThreadLocale
GetLastError
GetCurrentDirectoryW
BackupRead
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
OpenMutexA
GetProcessId
LocalAlloc
GetNumberFormatW
GlobalGetAtomNameW
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
VirtualProtect
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
OpenSemaphoreW
FindFirstVolumeA
FindAtomW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DeleteFileW
CreateFileW
ReadFile
FlushFileBuffers
FindFirstFileW
GetCommandLineW
SetDefaultCommConfigA
GetFileSize
GetComputerNameA
GetStartupInfoA
WriteConsoleW
SetStdHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DeleteFileA
HeapSetInformation
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleMode
HeapReAlloc
LCMapStringW
CloseHandle
user32
GetComboBoxInfo
CharUpperW
gdi32
GetBoundsRect
GetTextFaceW
SelectPalette
advapi32
LookupAccountSidW
shell32
DragFinish
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ