Static task
static1
Behavioral task
behavioral1
Sample
3675c4470fa8701d5fc28c91ef9ca0e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3675c4470fa8701d5fc28c91ef9ca0e3.exe
Resource
win10v2004-20231215-en
General
-
Target
3675c4470fa8701d5fc28c91ef9ca0e3
-
Size
20KB
-
MD5
3675c4470fa8701d5fc28c91ef9ca0e3
-
SHA1
44e5caa4368f23c27cad04586f92ae6974f26c02
-
SHA256
e80d85f06b1e8f26c59c90f1032a74cd8c751a82faece3e57d44fb6f2bf38a91
-
SHA512
3072462a3931fa0c87417771fa4bc8fb20f44344c39ecaafe81847828069251413e71d36f5e332caeabbb49d164be461c8aa656387f015bc3256f9b7a341a803
-
SSDEEP
384:M1okEBZWJxMEnTJRUwJ4SuaiymCaUusR5WBPdMOL/LQs:M2kEBZanTJRhJ4SpmCwnjx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3675c4470fa8701d5fc28c91ef9ca0e3
Files
-
3675c4470fa8701d5fc28c91ef9ca0e3.exe windows:4 windows x86 arch:x86
8073443dc35769143d2b40d3ee39ed59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeLibrary
GetCommandLineA
GetConsoleWindow
GetEnvironmentVariableA
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetTempPathA
GetTickCount
GetTimeZoneInformation
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
ReadFile
SetFilePointer
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcpyA
lstrlenA
msvcrt
_itoa
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_winmajor
abort
atexit
atoi
calloc
free
fwrite
memcpy
memset
printf
signal
sprintf
strncmp
strstr
strtok
vfprintf
shell32
StrStrIA
urlmon
URLDownloadToFileA
user32
CallNextHookEx
DispatchMessageA
GetForegroundWindow
GetKeyNameTextA
GetKeyState
GetKeyboardLayout
GetKeyboardState
GetMessageA
GetWindowTextA
MapVirtualKeyA
MapVirtualKeyExA
SetWindowsHookExA
ShowWindow
ToUnicodeEx
TranslateMessage
UnhookWindowsHookEx
ws2_32
WSAStartup
closesocket
connect
gethostbyname
htons
recv
send
socket
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 280B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE