Static task
static1
Behavioral task
behavioral1
Sample
3a1449e6c3d7136053de6d53e36c3b47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a1449e6c3d7136053de6d53e36c3b47.exe
Resource
win10v2004-20231222-en
General
-
Target
3a1449e6c3d7136053de6d53e36c3b47
-
Size
32KB
-
MD5
3a1449e6c3d7136053de6d53e36c3b47
-
SHA1
a47a9681440ec844c021ae338d8d19c4032dd247
-
SHA256
18a2d81e31d8358bb1c3e2b86a6bccd1d8bb1688c32488e8963025c1593d2a71
-
SHA512
f7e61e9df30c66306478b297da1ba5a82b7a401560e227f78cd31412938c2269b4bf6ca1e11b8eab83e07eb51288df0dc16a1e6781996db953b6fb637b1a2020
-
SSDEEP
384:EC8U8u+9PXVmVq94jP3lI4TizP6NM61QLuNEyTn3VhjN59AB1PnGaWt8m0W:N8Nu+1OjP37ezP6u8QLuNE23zNk1P7m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a1449e6c3d7136053de6d53e36c3b47
Files
-
3a1449e6c3d7136053de6d53e36c3b47.exe windows:4 windows x86 arch:x86
fc285fc142b49fbdc0704e8c6bbb0b01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
GetCurrentThreadId
Sleep
CreateThread
GetStartupInfoA
GetCommandLineA
SetUnhandledExceptionFilter
CreateDirectoryA
LockResource
SetFilePointer
ReadFile
GetLastError
GetTempPathA
FreeLibrary
LoadLibraryA
GetProcAddress
lstrcatA
DeleteFileA
SetLastError
lstrcpyA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
GetWindowsDirectoryA
lstrlenA
GetCurrentProcess
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
CloseHandle
GetModuleHandleA
ExitProcess
user32
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
wsprintfA
LoadCursorA
LoadIconA
BlockInput
advapi32
SetFileSecurityA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegOpenKeyExA
RegSaveKeyA
RegCloseKey
RegCreateKeyExA
RegRestoreKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegDeleteKeyA
RegDeleteValueA
LookupAccountNameA
shell32
ShellExecuteA
msvcrt
strstr
_strrev
_strnset
_strcmpi
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
strtok
memset
??2@YAPAXI@Z
memcpy
strchr
_except_handler3
__CxxFrameHandler
strlen
??3@YAXPAX@Z
fclose
fwrite
fopen
realloc
malloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ