Static task
static1
Behavioral task
behavioral1
Sample
3d842cfa7b26b6ae90e46b22a47e57e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d842cfa7b26b6ae90e46b22a47e57e4.exe
Resource
win10v2004-20231215-en
General
-
Target
3d842cfa7b26b6ae90e46b22a47e57e4
-
Size
40KB
-
MD5
3d842cfa7b26b6ae90e46b22a47e57e4
-
SHA1
fde3477578c870b07ce36760d339df3cbfdf5124
-
SHA256
2c719082cd97cddd70853c6329b8563754d8a15641015cb46fa44e53d3bc459d
-
SHA512
667aa77679e5f109289fa40cc07204c7ab2cd67ecd5fa93667dff52e392adf8c86888aeadf3f828ec146338008c4b3047fda40eed2514a67076c446cf01cdc55
-
SSDEEP
768:fIN6T/1rkELDMEn2W1bO+OhfTq2AzYQr/RSzmW1ZjGNcd:a6Vn2mS+mq2AE+imW1lMcd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d842cfa7b26b6ae90e46b22a47e57e4
Files
-
3d842cfa7b26b6ae90e46b22a47e57e4.exe windows:1 windows x86 arch:x86
0ff36e63b5f7d47641e9265ba64821ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAGetLastError
__WSAFDIsSet
closesocket
connect
gethostbyname
getsockname
htons
inet_addr
inet_ntoa
recv
select
send
socket
wininet
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
HttpQueryInfoA
netapi32
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
NetUserSetInfo
setupapi
SetupIterateCabinetA
secur32
LsaFreeReturnBuffer
LsaEnumerateLogonSessions
LsaGetLogonSessionData
psapi
EnumProcesses
kernel32
DeleteFileA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessId
CloseHandle
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
InterlockedExchange
IsBadWritePtr
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MulDiv
MultiByteToWideChar
OpenMutexA
OpenProcess
Process32First
CreateDirectoryA
ReadFile
RtlUnwind
RtlZeroMemory
SetFilePointer
SizeofResource
Sleep
WaitForSingleObject
WriteFile
lstrlenA
CreateProcessA
CreateThread
user32
ExitWindowsEx
gdi32
CreateHatchBrush
advapi32
AllocateAndInitializeSid
FreeSid
LookupAccountSidW
LookupPrivilegeValueA
DuplicateTokenEx
CreateProcessAsUserA
ChangeServiceConfig2A
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
OpenSCManagerA
OpenServiceA
QueryServiceConfigA
QueryServiceStatus
RegisterServiceCtrlHandlerA
StartServiceA
StartServiceCtrlDispatcherA
OpenProcessToken
GetTokenInformation
AdjustTokenPrivileges
EqualSid
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
comctl32
InitCommonControls
shlwapi
StrStrIA
crtdll
__GetMainArgs
_vsnprintf
atol
exit
memcmp
memcpy
memset
raise
rand
signal
sprintf
srand
strcat
strchr
strcmp
strncmp
strrchr
strstr
time
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 5KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE