Static task
static1
Behavioral task
behavioral1
Sample
3b15e508148ba5ce4b81a242102621ddc2211d0add67b08848e21efe8607e8ff.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3b15e508148ba5ce4b81a242102621ddc2211d0add67b08848e21efe8607e8ff.exe
Resource
win10v2004-20231130-en
General
-
Target
3b15e508148ba5ce4b81a242102621ddc2211d0add67b08848e21efe8607e8ff
-
Size
175KB
-
MD5
e4832c37e76f842e250f9e4ba5e06b75
-
SHA1
23f37f0b0bc6bd27a4292b1631e30fff21bc3895
-
SHA256
3b15e508148ba5ce4b81a242102621ddc2211d0add67b08848e21efe8607e8ff
-
SHA512
8b049fdb6405435e1da218c7d21744c599ecc614def4d99e7622457635f32daf0536a68610f23f8c9a3ca1d492dd08df4a0bb19791b8903d013389e506ef5f27
-
SSDEEP
3072:spLemeTM07RH+Rej3a6BDMua5efCtCgCo8ioXoRz:0LteTL+Rk3a6BDk5UoN8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b15e508148ba5ce4b81a242102621ddc2211d0add67b08848e21efe8607e8ff
Files
-
3b15e508148ba5ce4b81a242102621ddc2211d0add67b08848e21efe8607e8ff.exe windows:5 windows x86 arch:x86
4657ee4925981161689e515323a2b5d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetComputerNameA
CreateMutexW
OpenFile
TlsGetValue
FindResourceExW
LocalCompact
LoadResource
ReadConsoleA
InterlockedDecrement
ScrollConsoleScreenBufferW
CompareFileTime
SetDefaultCommConfigW
GetProfileStringW
WaitForSingleObject
OpenSemaphoreA
_lclose
GetProcessPriorityBoost
GetSystemTimeAsFileTime
GlobalAlloc
LoadLibraryW
GetConsoleMode
GetPrivateProfileStructW
GetFileAttributesA
ReadFile
lstrcatA
CompareStringW
lstrlenW
DisconnectNamedPipe
DeactivateActCtx
GetPrivateProfileIntW
ReleaseActCtx
GetLastError
IsDBCSLeadByteEx
GetProcAddress
GetProcessHeaps
CreateNamedPipeA
IsValidCodePage
SearchPathA
GetLocalTime
BuildCommDCBAndTimeoutsW
SetConsoleDisplayMode
BeginUpdateResourceA
VirtualLock
AddAtomA
GetTapeParameters
ContinueDebugEvent
FreeEnvironmentStringsW
WriteProfileStringW
VirtualProtect
GetConsoleCursorInfo
GetVersionExA
FindActCtxSectionStringW
SuspendThread
lstrcpyW
CopyFileExA
GetModuleHandleA
GetModuleHandleW
Sleep
GetStartupInfoW
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetCPInfo
GetACP
GetOEMCP
HeapSize
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
HeapAlloc
VirtualAlloc
HeapReAlloc
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
RaiseException
user32
GetCursorPos
Sections
.text Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 737KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ