Static task
static1
Behavioral task
behavioral1
Sample
3e028034b18757a187d9d26e915653a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e028034b18757a187d9d26e915653a0.exe
Resource
win10v2004-20231215-en
General
-
Target
3e028034b18757a187d9d26e915653a0
-
Size
2.3MB
-
MD5
3e028034b18757a187d9d26e915653a0
-
SHA1
f4359d791dc156a0a309a58c88320aa149808ff6
-
SHA256
50189aa3875d800ec0b855e59a1fd58b6baf5457de5e0d9d4430cf1bebc06550
-
SHA512
2c7a65d9d2cc754c8063a1bfe0e3b1bbfe666fa6a5c24d55c39cdf95250ccfb10e1c2b35aa80d423d812ac8afdb6c4a287b0f814001cdef417e9c413b71f95c7
-
SSDEEP
3072:1F2LsXf9/T8Y57spqmS0AKAIhkAIfIAI/AAIs:1bfqG7AAI2AIgAI4AIs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e028034b18757a187d9d26e915653a0
Files
-
3e028034b18757a187d9d26e915653a0.exe windows:4 windows x86 arch:x86
c30461d69873f8d7589f7f22618a6dc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5281
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3748
ord5065
ord1725
ord5260
ord2446
ord6614
ord5277
ord2982
ord3147
ord3259
ord4465
ord6691
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4432
ord6478
ord825
ord6514
ord6800
ord4284
ord2233
ord6055
ord5241
ord5290
ord3749
ord1727
ord5261
ord2124
ord3136
ord4424
ord3610
ord567
ord656
ord4275
ord3398
ord3733
ord686
ord810
ord384
ord4271
ord2864
ord3303
ord3914
ord2379
ord3663
ord3571
ord3619
ord3626
ord2414
ord2862
ord2096
ord1641
ord1146
ord6008
ord4000
ord3297
ord3290
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4353
ord561
ord815
ord609
ord641
ord795
ord2514
ord2621
ord1134
ord2575
ord4396
ord3574
ord3402
ord3721
ord5265
ord4998
ord6052
ord1775
ord5280
ord4425
ord3597
ord1168
ord860
ord324
ord2301
ord2370
ord2302
ord4234
ord6215
ord1768
ord6197
ord6380
ord4287
ord4299
ord6199
ord858
ord4277
ord6662
ord2818
ord4710
ord755
ord470
ord2642
ord6805
ord939
ord941
ord4224
ord3874
ord535
ord4376
ord3573
ord5875
ord3089
ord4476
ord640
ord5785
ord1640
ord323
ord4278
ord2764
ord2820
ord2123
ord6442
ord690
ord537
ord6663
ord1988
ord2393
ord5207
ord6059
ord389
ord2086
ord2574
ord3572
ord556
ord809
ord1793
ord2122
ord2859
ord3698
ord765
ord3693
ord2405
ord5678
ord6172
ord5788
ord5787
ord2380
ord5736
ord4853
ord1105
ord6334
ord924
ord2754
ord6374
ord5163
ord2385
ord5240
ord4407
ord1776
ord4078
ord6054
ord4108
ord4960
ord4963
ord4524
ord4529
ord4526
ord4543
ord4545
ord4531
ord4889
ord4720
ord4347
ord4340
ord5076
ord6817
ord4892
ord4370
ord4899
ord4588
ord4589
ord6835
ord6808
ord6856
ord6845
ord6812
ord6815
ord6816
ord6858
ord6846
ord6839
ord6814
ord6847
ord6867
ord6859
ord6832
ord6855
ord6823
ord6857
ord6807
ord6591
ord6650
ord6597
ord823
ord800
ord540
ord3811
ord861
ord3738
ord2614
ord1576
msvcrt
__set_app_type
_setmbcp
_ftol
__CxxFrameHandler
_mbscmp
_splitpath
sprintf
atoi
strrchr
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_controlfp
kernel32
GetModuleFileNameA
GetCommandLineA
ExpandEnvironmentStringsA
CreateFileA
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetPrivateProfileStringA
lstrcpyA
lstrlenA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
CloseHandle
WriteFile
GetLastError
WaitForSingleObject
GetTempFileNameA
GetTempPathA
LocalFree
FormatMessageA
GetCurrentProcessId
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
CreateMutexA
OpenProcess
GetFullPathNameA
user32
PtInRect
PostMessageA
KillTimer
SetTimer
InvalidateRect
MessageBoxA
IsIconic
GetSystemMetrics
GetClientRect
LoadImageA
GetWindowRect
LoadIconA
LoadBitmapA
GetMessagePos
ScreenToClient
GetParent
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
GetWindow
SendMessageA
SetFocus
EnableWindow
wsprintfA
GetWindowLongA
SetWindowLongA
GetTopWindow
GetClassNameA
FindWindowExA
DrawIcon
FindWindowA
gdi32
CreateSolidBrush
CreateFontIndirectA
Rectangle
CreatePen
GetObjectA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
PatBlt
BitBlt
CreateFontA
advapi32
RegSetValueExA
RegDeleteKeyA
RegOpenKeyA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHBrowseForFolderA
ShellExecuteA
SHChangeNotify
SHGetPathFromIDListA
comctl32
ImageList_AddMasked
_TrackMouseEvent
urlmon
URLDownloadToFileA
wininet
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
FindCloseUrlCache
FindFirstUrlCacheEntryA
shlwapi
PathRemoveFileSpecA
StrFormatByteSizeA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ