Static task
static1
Behavioral task
behavioral1
Sample
3ffdd4c7b343f111e706422bae0d1fab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ffdd4c7b343f111e706422bae0d1fab.exe
Resource
win10v2004-20231215-en
General
-
Target
3ffdd4c7b343f111e706422bae0d1fab
-
Size
3KB
-
MD5
3ffdd4c7b343f111e706422bae0d1fab
-
SHA1
6acbe7d903c7705639c407c8f18a99ca03151f22
-
SHA256
e7866322266300ce8d5709bdf4c3cb5962796ea367b545cd3b35b6f8ad3d51c0
-
SHA512
93766f0243728eaa0d9b336b44830d9a7d7ca96115104c1d76cf2106c431559608442d4a08e8f89097ffa936e68e7ccfb323ad694ad8350f6d4170df2a54b094
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ffdd4c7b343f111e706422bae0d1fab
Files
-
3ffdd4c7b343f111e706422bae0d1fab.exe windows:1 windows x86 arch:x86
995f27dd4007f938ee7feec5bdefed7d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToFileA
shell32
ShellExecuteA
kernel32
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
ExitProcess
RtlMoveMemory
FreeResource
lstrcat
GetTempPathA
DeleteFileA
Sections
.data Size: 512B - Virtual size: 302B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 222B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ