Static task
static1
Behavioral task
behavioral1
Sample
3d1874ace5a04645ce8c6639340c99a3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d1874ace5a04645ce8c6639340c99a3.exe
Resource
win10v2004-20231215-en
General
-
Target
3d1874ace5a04645ce8c6639340c99a3
-
Size
485KB
-
MD5
3d1874ace5a04645ce8c6639340c99a3
-
SHA1
a7643ee2248355aedaeee70b35440596016bd83a
-
SHA256
20de944b5e8e9c65df61037dc2885253b740a672295dabad5d11013c254f98e1
-
SHA512
971ca5633199178a4357581dea08d6bfbed3ba3a75bd31c192fce101ffd24762dabb24131d7fb3a8854ab6f3267d032842cb4e48cd81d8cae90652141d140242
-
SSDEEP
12288:BlWnV2pZe2GKLri2F6xXt1b6+J6+ulQufdSce/cnPfkB:BWNuu2F6p6j+uiu1dpnHkB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d1874ace5a04645ce8c6639340c99a3
Files
-
3d1874ace5a04645ce8c6639340c99a3.exe windows:4 windows x86 arch:x86
e4a48d4093442cddd5a11523c94015e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
RemoveDirectoryA
Beep
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
LoadCursorA
DispatchMessageA
PeekMessageA
SetCursor
MessageBoxA
wsprintfA
shell32
ShellExecuteA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ