Static task
static1
Behavioral task
behavioral1
Sample
3adc72a7f46663b278be509ae047b490.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3adc72a7f46663b278be509ae047b490.exe
Resource
win10v2004-20231215-en
General
-
Target
3adc72a7f46663b278be509ae047b490
-
Size
44KB
-
MD5
3adc72a7f46663b278be509ae047b490
-
SHA1
20ab2c0cfde8fb9c31b14e1bd07251ce65fb7d20
-
SHA256
bdb613ee7b492b7ab8432e05e5fcbd3cfacc9cb308c3bf3f55c8e45dbe6922b1
-
SHA512
4399d3492c6e8bef118755279a9a55ecf4ded30d58c18429ea494cf0d60f30b610af80b9dec7019684ea89ee6cf75d718a618e9fd792c58fe21a3f75eb173cdd
-
SSDEEP
384:IIhWwLhIhF42mkcCG1SLl1CLk7A2a/NXJYrMKzpfJSqmNSH83wu2J9t:XWSmhF42mkS8L7CLIM1XEnzpxbmzATJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3adc72a7f46663b278be509ae047b490
Files
-
3adc72a7f46663b278be509ae047b490.exe windows:4 windows x86 arch:x86
d38263e7eeabb99a55bc4ae48518da6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
GetTempPathA
CreateProcessA
lstrcmpA
DeleteFileA
RemoveDirectoryA
lstrlenA
lstrcatA
lstrcpyA
GetModuleFileNameA
SetCurrentDirectoryA
CreateFileA
ReadFile
CloseHandle
GetModuleHandleA
GetProcAddress
Sleep
GetVersionExA
GetStartupInfoA
user32
GetWindowDC
GetDesktopWindow
EndPaint
BeginPaint
InvalidateRect
SetWindowLongA
PtInRect
GetCursorPos
DefWindowProcA
RegisterClassExA
LoadCursorA
ReleaseDC
DdeConnect
DdeClientTransaction
EnableWindow
MessageBoxA
DestroyWindow
LoadIconA
SetClassLongA
SetTimer
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
PostQuitMessage
ShowWindow
ScreenToClient
GetParent
GetDlgItem
CharLowerA
GetWindowLongA
GetWindowRect
MapWindowPoints
DrawTextA
GetWindowTextA
FindWindowA
PostMessageA
DdeInitializeA
DdeCreateStringHandleA
CreateDialogParamA
SetForegroundWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
KillTimer
wsprintfA
SetDlgItemTextA
MoveWindow
gdi32
GetStockObject
GetObjectA
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
DeleteObject
SetBkMode
SetTextColor
advapi32
RegOpenKeyA
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
atoi
__p___argc
__p___argv
memset
strrchr
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ