Static task
static1
Behavioral task
behavioral1
Sample
3d13fc2deb3eec170b3391d9bad7165a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d13fc2deb3eec170b3391d9bad7165a.exe
Resource
win10v2004-20231215-en
General
-
Target
3d13fc2deb3eec170b3391d9bad7165a
-
Size
146KB
-
MD5
3d13fc2deb3eec170b3391d9bad7165a
-
SHA1
93ef0781b4d2647770feb92a18be4e8702adf4f8
-
SHA256
a0a6f2812f7e207e5b512fef8d30ae9b5606029387430f1e84edc4535f55d005
-
SHA512
767e9e5de48e773e6598423d631de8415d900e4293104464a94e52a22e93798d602d032e56178f5c29a330439b62e8581c4b8c1f5fcec9486cf4e0f359ce5c7e
-
SSDEEP
1536:0UdAQg2v8rVgS2zJLkQvpl3Q5plT770LB4utDWpbXIyyHDdwalJBsElSRDJgTUlt:5AokahLQ5pRimQSIRHqKsElSCUlWS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d13fc2deb3eec170b3391d9bad7165a
Files
-
3d13fc2deb3eec170b3391d9bad7165a.exe windows:5 windows x86 arch:x86
8ffc063cc04c8a21865cef096d3590ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
FreeEnvironmentStringsW
ExitProcess
FindResourceA
LoadResource
GetCurrentProcess
WaitForSingleObject
FindResourceExA
GetLastError
SetLastError
VirtualProtectEx
LockResource
WriteProcessMemory
CreateThread
IsBadReadPtr
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
HeapAlloc
GetCommandLineA
GetStartupInfoA
HeapFree
RaiseException
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
GetModuleHandleW
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
MultiByteToWideChar
ReadFile
SetHandleCount
GetFileType
SetFilePointer
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
InitializeCriticalSectionAndSpinCount
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ