Static task
static1
Behavioral task
behavioral1
Sample
3a831ace4d4982b549ebe12cfa8d25274eab8a1c7f788b518881325703a80582.exe
Resource
win10-20231023-en
General
-
Target
3a831ace4d4982b549ebe12cfa8d25274eab8a1c7f788b518881325703a80582
-
Size
679KB
-
MD5
e16cf9200974432922bd3145f14717aa
-
SHA1
5147d1b5d11f431e10c2600ae3fc604523e06a56
-
SHA256
3a831ace4d4982b549ebe12cfa8d25274eab8a1c7f788b518881325703a80582
-
SHA512
3873af313c34673ae1648b7fa25bce3185130bbb54e28b9bbde8d31a043f94c639365637972342b0a62ac7b9daa4b1a709bb590b1907bdc5d295c8821b973f5b
-
SSDEEP
12288:mVpu3ZnThS7GoR2HwDtjqrf49+SkRQTM6ViuB844+q5tUsg3F5hqG0wBL:m0ZThI2Hw5Grfo+SkRCEuB84R5A5c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a831ace4d4982b549ebe12cfa8d25274eab8a1c7f788b518881325703a80582
Files
-
3a831ace4d4982b549ebe12cfa8d25274eab8a1c7f788b518881325703a80582.exe windows:6 windows x86 arch:x86
11a42c0ca6e9e0c08880b494057db1c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetModuleFileNameW
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
advapi32
LookupPrivilegeValueA
ws2_32
WSAGetLastError
iphlpapi
GetAdaptersInfo
Sections
.text Size: - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 550KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c0 Size: - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c1 Size: 677KB - Virtual size: 677KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ