Static task
static1
Behavioral task
behavioral1
Sample
3c245ea740116ca12f5b0738660d4ee1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c245ea740116ca12f5b0738660d4ee1.exe
Resource
win10v2004-20231215-en
General
-
Target
3c245ea740116ca12f5b0738660d4ee1
-
Size
30KB
-
MD5
3c245ea740116ca12f5b0738660d4ee1
-
SHA1
6ea758f84abf4b02a4b546dd0c7a7c05532ffd0c
-
SHA256
8be831d854f8011eba63674672dd3e244d31c925547993e041e13f463525e8d3
-
SHA512
48e77102a2e7d3f0b1efb4ef4a4372f619e1bb82f35774ae82a79bf46f2a687b84e4acc5e5958b2f2ca83aaf681e4d1e18e424fae10dd77a0b6dfd4c12e417b6
-
SSDEEP
768:Dgl8/v/VzRx8oHtDG1ZjK6kY+cjwZvU4/LiEufqYxZC:Dy8/lRx8oNCTkajwZv7/Lruji
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c245ea740116ca12f5b0738660d4ee1
Files
-
3c245ea740116ca12f5b0738660d4ee1.exe windows:4 windows x86 arch:x86
ca8a29469111d95c902150e458186706
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
ExitProcess
GetStartupInfoA
SwitchToThread
OpenEventA
VirtualProtect
GetComputerNameExW
SetCurrentDirectoryA
GetACP
DosPathToSessionPathW
GetPrivateProfileSectionW
RequestWakeupLatency
GetFileAttributesW
RegisterConsoleVDM
EnumLanguageGroupLocalesA
GetLocaleInfoW
GlobalSize
DeleteFileW
SetConsoleOutputCP
GetCommTimeouts
LocalAlloc
IsProcessorFeaturePresent
FindResourceExW
SetProcessAffinityMask
ConvertThreadToFiber
DeviceIoControl
BackupRead
MapViewOfFileEx
EnumSystemLocalesW
RaiseException
SetThreadPriority
SetConsoleCursor
SetCommTimeouts
Sections
code Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
data Size: 22KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ