Static task
static1
Behavioral task
behavioral1
Sample
3a21b700750ad467054abe48e58b0b4f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a21b700750ad467054abe48e58b0b4f.exe
Resource
win10v2004-20231222-en
General
-
Target
3a21b700750ad467054abe48e58b0b4f
-
Size
258KB
-
MD5
3a21b700750ad467054abe48e58b0b4f
-
SHA1
2912f3476b7ae8309ab5affffd033e18c5ba62b8
-
SHA256
e9ed4bb8b267c41334bae0273c34d7be177dc6744e478b392a38821b00181c51
-
SHA512
da1d54b47b478ad25395e25edeb07488940eca0827ec977d57c5e3fb4a4800ca4ec44a129b28fe22010f7548b55c48750b604d7cb9ef28bb841195c620d4f11c
-
SSDEEP
3072:xbILQHayykUrdziiLa1oHgzbmN2EMacf/3XqDtHY1nZw/7mYwWYOq38G/Bojp5Y:xIv7kS9a1zbmN2EMz3e7KOqAk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a21b700750ad467054abe48e58b0b4f
Files
-
3a21b700750ad467054abe48e58b0b4f.exe windows:4 windows x86 arch:x86
dd65f4d547e40333d01628b11b123f56
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
SetUnhandledExceptionFilter
SetErrorMode
DuplicateHandle
GetModuleFileNameA
OpenMutexA
CreateMutexW
CreateMutexA
GetSystemDirectoryW
CreateEventA
GlobalMemoryStatus
LeaveCriticalSection
FileTimeToLocalFileTime
HeapValidate
HeapCompact
HeapAlloc
HeapCreate
HeapFree
CopyFileW
CreateDirectoryA
ResetEvent
WaitForMultipleObjects
VirtualFree
VirtualProtect
VirtualAlloc
GetCurrentThreadId
GetCommandLineA
GetModuleHandleA
WriteConsoleA
GetEnvironmentVariableW
GetTickCount
QueryPerformanceCounter
HeapSize
LCMapStringW
LCMapStringA
GetSystemInfo
GetLocaleInfoA
VirtualQuery
InterlockedExchange
RtlUnwind
HeapReAlloc
LoadLibraryA
GetCPInfo
GetOEMCP
GetACP
GetStringTypeW
MultiByteToWideChar
GetStringTypeA
HeapDestroy
GetStartupInfoA
GetFileType
GetSystemTimeAsFileTime
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetExitCodeProcess
PeekNamedPipe
CreatePipe
TerminateProcess
GetVersionExW
GetCurrentProcessId
GetCurrentThread
UnhandledExceptionFilter
GetStdHandle
WriteFile
GetCurrentProcess
GetProcAddress
ExitProcess
GetVersionExA
user32
GetSysColorBrush
ShowScrollBar
GetDlgItemInt
SetDlgItemInt
FrameRect
OpenClipboard
DestroyWindow
GetKeyNameTextW
GetWindowTextW
GetWindowTextLengthW
UpdateWindow
GetFocus
SetFocus
ShowWindow
TrackPopupMenu
GetCursorPos
RegisterClassExA
GetClassInfoExA
EnumChildWindows
GetActiveWindow
AppendMenuA
CallWindowProcA
GetMessageA
ValidateRect
InvalidateRect
BeginPaint
MapWindowPoints
DestroyMenu
CloseClipboard
SetClipboardData
advapi32
RegOpenKeyExW
OpenSCManagerW
RegQueryValueExW
QueryServiceStatus
OpenServiceA
RegCloseKey
ole32
OleInitialize
CoRevokeClassObject
CoCreateInstance
CoInitialize
CoUninitialize
OleUninitialize
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 107KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ