Static task
static1
Behavioral task
behavioral1
Sample
3b0e8d55998cdda03b7277d44b2d7da0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b0e8d55998cdda03b7277d44b2d7da0.exe
Resource
win10v2004-20231215-en
General
-
Target
3b0e8d55998cdda03b7277d44b2d7da0
-
Size
1.1MB
-
MD5
3b0e8d55998cdda03b7277d44b2d7da0
-
SHA1
d9a2334d72566235d55f8903132f6fee3a61263c
-
SHA256
78a9891dce76165c14a6652ddab09e9d292b7dcf3097000b8a70d0c992a87082
-
SHA512
85da6cde9aa5f1aa97d93f2b13fe4463f8acc884e4e4f31d15db25aa86bdb4a15f51b61caff7b81b175c9d02cc89fa815f122d627d1e349fe210445851e2fe7a
-
SSDEEP
12288:tT0a8uvHcNMUNPvS1yX6x0fQOy/aT0a8uvHcNMUNPvS1yX6x0fQOy/mFPaKEkJ1+:qVQsFvS8cs32VQsFvS8cs3zQ+yQ9k73
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3b0e8d55998cdda03b7277d44b2d7da0
Files
-
3b0e8d55998cdda03b7277d44b2d7da0.exe windows:4 windows x86 arch:x86
92c21b7950140afc440ac22e9369d575
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_time64
sprintf
memmove
strncmp
strchr
atol
??2@YAPAXI@Z
??3@YAXPAX@Z
printf
atoi
_strtoui64
??_U@YAPAXI@Z
_strupr
strrchr
_gmtime32_s
_wcsupr
wcsncmp
wcstombs
??_V@YAXPAX@Z
strncpy
__FrameUnwindFilter
memmove_s
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBDH@Z
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??9type_info@@QBE_NABV0@@Z
??8type_info@@QBE_NABV0@@Z
?what@exception@std@@UBEPBDXZ
_purecall
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_CxxThrowException
_strnicmp
__CxxDetectRethrow
__CxxRegisterExceptionObject
__CxxExceptionFilter
memset
free
malloc
__p__fmode
__p__commode
_configthreadlocale
__wgetmainargs
_XcptFilter
__set_app_type
_amsg_exit
_cexit
__CxxUnregisterExceptionObject
strstr
__CxxQueryExceptionSize
__CxxFrameHandler3
memcpy
_except_handler3
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_encode_pointer
kernel32
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
GetModuleHandleA
UnmapViewOfFile
CloseHandle
VirtualProtect
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
CreateMutexA
WaitForSingleObject
ReleaseMutex
OpenThread
GetCurrentThreadId
InterlockedPushEntrySList
ReleaseSemaphore
VirtualQuery
FindResourceA
LoadResource
GetCurrentProcess
GetVersionExA
CreateToolhelp32Snapshot
Module32First
GetProcAddress
Module32Next
EnumResourceNamesA
VirtualAlloc
SetEvent
CreateEventA
ExitProcess
GetSystemTime
SystemTimeToFileTime
WaitForMultipleObjects
InterlockedFlushSList
CreateSemaphoreA
InitializeSListHead
CreateThread
GetExitCodeThread
TerminateThread
VirtualFree
GetModuleFileNameA
GetCommandLineW
LocalFree
GlobalAlloc
CreateFileA
DeviceIoControl
CreateFileW
GlobalFree
LoadLibraryA
TlsAlloc
TlsSetValue
TlsGetValue
TlsFree
FreeLibrary
MapViewOfFile
CreateFileMappingA
lstrcmpA
LocalAlloc
GetModuleFileNameW
GetLastError
GetSystemInfo
GetWindowsDirectoryA
GetVolumeInformationA
GetCurrentThread
TerminateProcess
LockResource
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
lstrlenW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
advapi32
CryptGenRandom
OpenThreadToken
CloseEventLog
ReadEventLogA
GetNumberOfEventLogRecords
OpenEventLogA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
SetThreadToken
CryptAcquireContextA
RevertToSelf
oleaut32
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
VariantInit
SysFreeString
SystemTimeToVariantTime
SysAllocString
VariantClear
msvcm80
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
__setusermatherr_m
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
?_Myptr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IBEPBDXZ
?set_new_handler@std@@YAP6AXXZP6AXXZ@Z
?uncaught_exception@std@@YA_NXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wintrust
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
WinVerifyTrust
CryptCATAdminReleaseContext
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
crypt32
CertFindCertificateInStore
CertGetNameStringA
CryptMsgClose
CertCloseStore
CryptQueryObject
CryptMsgGetParam
CryptDecodeObject
CertFreeCertificateContext
iphlpapi
GetAdaptersInfo
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
CoSetProxyBlanket
CoUninitialize
shell32
CommandLineToArgvW
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiClassNameFromGuidA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
rpcrt4
UuidCreate
mscoree
_CorExeMain
Sections
.text Size: 980KB - Virtual size: 977KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ