Static task
static1
Behavioral task
behavioral1
Sample
3a0cb042f9ad555762247ad2c3ee7c68.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a0cb042f9ad555762247ad2c3ee7c68.exe
Resource
win10v2004-20231215-en
General
-
Target
3a0cb042f9ad555762247ad2c3ee7c68
-
Size
93KB
-
MD5
3a0cb042f9ad555762247ad2c3ee7c68
-
SHA1
483703c57370f025cb3a7cfa0ebc45742a02ffe2
-
SHA256
eb09c63405df898ecbed4e0d0ee8decd4dcccc54b38114ef04e2bceb40b6a8e8
-
SHA512
61adbd83b10c21d14abcdde9afcc47d8bb40174b293eeb25126f7c3572dfb402656fa0ca8ce5769167cf1405949422c839cf766e99cbdd9729eece080a7fe970
-
SSDEEP
1536:W7WU3gcb7dTQzuV2LSUdY4fl5rOruOhgOP9nqTIqslLTfx/h07ad/6QtRVLR/rg7:W7WyRVQ6UrXlYCO6OPpqTk/Z60y0f/rc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a0cb042f9ad555762247ad2c3ee7c68
Files
-
3a0cb042f9ad555762247ad2c3ee7c68.exe windows:4 windows x86 arch:x86
68063ae4a5a1f656d290211e66062640
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
NtWaitForSingleObject
user32
GetScrollInfo
DeferWindowPos
SetWindowTextA
ShowWindow
GetScrollRange
CreateWindowExA
CallNextHookEx
CharLowerA
EqualRect
GetDesktopWindow
EnumWindows
DefFrameProcA
GetPropA
GetCapture
IsWindowEnabled
IsMenu
GetClassLongA
DrawMenuBar
GetMenuItemCount
CharNextA
DrawTextA
GetMenu
GetMenuItemInfoA
HideCaret
FillRect
GetParent
EnumThreadWindows
GetDlgItem
CharLowerBuffA
ShowScrollBar
EndDeferWindowPos
GetWindowTextA
GetSysColorBrush
GetKeyState
IsChild
FrameRect
GetSysColor
CreateIcon
DrawEdge
TrackPopupMenu
GetScrollPos
GetCursor
EnableWindow
GetMessagePos
GetClassInfoA
DefMDIChildProcA
DrawIconEx
DefWindowProcA
GetDC
GetMenuItemID
MessageBoxA
GetActiveWindow
GetSubMenu
CharToOemA
GetMenuStringA
GetClipboardData
GetClientRect
SetCursor
CheckMenuItem
SetWindowLongA
DrawIcon
SetTimer
ClientToScreen
EnableMenuItem
GetLastActivePopup
GetDCEx
DrawFrameControl
GetMenuState
EndPaint
SystemParametersInfoA
FindWindowA
GetCursorPos
GetKeyNameTextA
RegisterClassA
DispatchMessageW
CreateMenu
BeginPaint
CallWindowProcA
EnumChildWindows
BeginDeferWindowPos
CreatePopupMenu
GetIconInfo
kernel32
SetErrorMode
GetModuleFileNameA
GetCommandLineA
Sleep
MulDiv
lstrcpyA
FreeLibrary
CreateThread
FindFirstFileA
SetLastError
GetCurrentThread
WideCharToMultiByte
GetVersion
EnterCriticalSection
LocalFree
ResetEvent
GetFullPathNameA
HeapDestroy
LocalReAlloc
GlobalDeleteAtom
SetHandleCount
CompareStringA
WriteFile
LoadLibraryExA
SetEndOfFile
GetLastError
MoveFileExA
GetCurrentProcess
GetThreadLocale
LoadResource
GetVersionExA
MoveFileA
DeleteCriticalSection
GlobalAddAtomA
CreateFileA
GetCurrentProcessId
ExitThread
GlobalFindAtomA
VirtualAllocEx
GetStringTypeW
LockResource
FindResourceA
HeapFree
ole32
CoGetContextToken
CoDisconnectObject
msvcrt
memset
calloc
_acmdln
sprintf
time
memmove
sqrt
memcpy
rand
mbstowcs
wcschr
clock
tolower
malloc
wcscspn
atol
wcstol
wcsncmp
srand
exit
swprintf
Sections
.data Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 411B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 512B - Virtual size: 411B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ