Static task
static1
Behavioral task
behavioral1
Sample
3e10134b87c0f31b19753672bd664be7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e10134b87c0f31b19753672bd664be7.exe
Resource
win10v2004-20231215-en
General
-
Target
3e10134b87c0f31b19753672bd664be7
-
Size
520KB
-
MD5
3e10134b87c0f31b19753672bd664be7
-
SHA1
e1127b563faa0e8c91c4dffd502ee2bed69e3315
-
SHA256
cb77ed87857b5c58f8254c7e90708ad37ad1295fdcd6dbb9cefee463a4320f19
-
SHA512
ae1f8b207016fa230fe8a7fa0feb9d8c1e32dbf35089362cc623a7cd7c7041551ae63752bdda817e71b56846fdf8ab380fa454408649a4184d66b18fca55e787
-
SSDEEP
6144:lQfsw0ZfKTYb9c1pEb3nLmSL1GsRsYDUw/RoJ6XWeYn3QtFjmtIVcm8iSbCxrwcD:dKKwmyIwsrDUKo1nWjhStiSbUccD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e10134b87c0f31b19753672bd664be7
Files
-
3e10134b87c0f31b19753672bd664be7.exe windows:4 windows x86 arch:x86
4d4e9044fe518fa44f2cfb09a9107db9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
HeapFree
VirtualFree
GetProcessHeap
IsBadReadPtr
VirtualAlloc
VirtualProtect
CopyFileA
GetModuleFileNameA
Sleep
GetTempPathA
GetComputerNameA
GetLastError
CreateMutexA
CreateFileA
CloseHandle
FreeLibrary
GetFileAttributesA
GetCurrentProcess
GetSystemTime
FindFirstFileA
FindNextFileA
ExitProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32Next
Module32First
lstrcmpA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
LoadLibraryA
lstrcatA
lstrlenA
GetEnvironmentVariableA
WriteFile
lstrcpyA
SetEndOfFile
CreateFileW
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
DeleteFileA
GetCommandLineA
GetVersionExA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
HeapSize
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
ReadFile
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
MessageBoxA
advapi32
RegOpenKeyA
RegQueryValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
GetUserNameA
shell32
SHGetFolderPathA
shlwapi
PathUnquoteSpacesA
PathRemoveArgsA
userenv
GetUserProfileDirectoryA
wininet
InternetOpenA
FtpSetCurrentDirectoryA
InternetCloseHandle
FtpPutFileA
InternetConnectA
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 316KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ