Static task
static1
Behavioral task
behavioral1
Sample
3d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3d.exe
Resource
win10v2004-20231023-en
General
-
Target
3d
-
Size
37KB
-
MD5
000b697ba3c11ee58bd8ff5496fca014
-
SHA1
baf81b2f3c1aad6b97e556faa9f6055bbe653911
-
SHA256
a6a336d3db96a9096d5f05c0ab52f87777966c60c366ace9a4fa2457e3556123
-
SHA512
712e014b4a2584b3600cd095d4fc575e2ea42f3e16002770ddd4fec17e52d856311c991f510345be8ceeb35feaf781a715ee5e360f6cf6c47af36fa8732c1bcb
-
SSDEEP
384:pvNaPqvtAs3su/I8xWI/cbZ/GdS3qBOi4Zj7aDn6k+TvnI89g0E:gipsu/H/ux+c7aDwI8K0E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d
Files
-
3d.exe windows:1 windows x86 arch:x86
f736665ac33b6775ed4c156ddf9c52af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
htons
inet_addr
recv
send
socket
kernel32
ExitProcess
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetFileSize
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetWindowsDirectoryA
CopyFileA
IsBadReadPtr
LoadLibraryA
MapViewOfFile
OpenMutexA
OpenProcess
Process32First
Process32Next
CreateFileA
ReadFile
CreateFileMappingA
ReadProcessMemory
ReleaseMutex
RtlUnwind
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetFileAttributesA
SetFilePointer
SetThreadPriority
CreateMutexA
TerminateProcess
UnmapViewOfFile
VirtualProtect
WriteFile
CreateThread
CreateToolhelp32Snapshot
user32
LoadCursorA
SetTimer
KillTimer
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
CreateWindowExA
DefWindowProcA
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
_strcmpi
toupper
abort
exit
fclose
feof
fgets
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memcmp
memcpy
memset
raise
rand
signal
srand
strcat
strchr
strcmp
strstr
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE