Static task
static1
Behavioral task
behavioral1
Sample
3c7435d26795e90fc876471ebe1982a8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c7435d26795e90fc876471ebe1982a8.exe
Resource
win10v2004-20231215-en
General
-
Target
3c7435d26795e90fc876471ebe1982a8
-
Size
35KB
-
MD5
3c7435d26795e90fc876471ebe1982a8
-
SHA1
e40a91278847a11e9977b03f69480a679b554d4e
-
SHA256
f2edd115a0917cd26a691e6613e0a49f9da3e944910180e16f56b2538cb9743d
-
SHA512
bc274f0c67dec7022e66eb35fed83e11d44241fd708f29d44466e717778cc7cd04647f797c86526623fed6f1c77a26c60443890aec307947ae75d0ba1b12c67f
-
SSDEEP
768:/VhR61d2hyKIDMi5FazjmilAA8/wv3pcSU:jed2ZFX/8/w3U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c7435d26795e90fc876471ebe1982a8
Files
-
3c7435d26795e90fc876471ebe1982a8.exe windows:5 windows x86 arch:x86
3bd1cf97537104404441a903e61f0f5f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpSendRequestW
InternetSetOptionW
InternetQueryOptionW
HttpOpenRequestA
HttpQueryInfoW
InternetReadFile
InternetConnectA
InternetOpenW
kernel32
lstrlenW
WriteFile
GetCurrentDirectoryW
HeapFree
FreeLibrary
GetProcAddress
LoadLibraryW
DeleteFileW
GetModuleHandleW
HeapCreate
HeapAlloc
GetModuleFileNameW
GetTempPathW
CreateFileW
GetFileSize
lstrcmpW
ExitProcess
ReadFile
CloseHandle
user32
wsprintfW
shell32
ShellExecuteW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 8B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ