Static task
static1
Behavioral task
behavioral1
Sample
3d5047b33b4f2582ac0a4e4fbc888636.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3d5047b33b4f2582ac0a4e4fbc888636.exe
Resource
win10v2004-20231215-en
General
-
Target
3d5047b33b4f2582ac0a4e4fbc888636
-
Size
22KB
-
MD5
3d5047b33b4f2582ac0a4e4fbc888636
-
SHA1
9b1786139fbef4403ce326faf97845bfb0b2500b
-
SHA256
510eba2f06ac9ac16fd4895c2bdb57b3bf8407a3ca359332f788aa8233a2c6e8
-
SHA512
f8ace777d57c4dff7d1338cf38ee4593edda224e69d9bfdcbfcd857b881942d41bfec8b43c3f593e93914abff5ac192809b409b79ff29a51b4f982359c97332e
-
SSDEEP
384:WsMEsstiz7bMNAEpBvYPEdEg1T78+RSuldoPVH5nza1d36XuyU3XbUNJaEodjr9Y:W6sdbovEEdEkTgEdEnzgkzU3AjIj18
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d5047b33b4f2582ac0a4e4fbc888636
Files
-
3d5047b33b4f2582ac0a4e4fbc888636.exe windows:4 windows x86 arch:x86
4a316997b10d7deab6e093af331f1511
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
HeapDestroy
HeapFree
HeapCreate
HeapAlloc
GetProcessHeap
CloseHandle
ReadFile
SetFilePointer
CreateFileA
ExitProcess
GetModuleFileNameA
Sleep
GetTickCount
QueryPerformanceCounter
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
lstrcmpiA
FreeLibrary
GetStartupInfoA
GetModuleHandleA
HeapReAlloc
GetCommandLineA
user32
wvsprintfA
wsprintfA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE