Static task
static1
Behavioral task
behavioral1
Sample
3835382d67a8067a185b31a6fa15c860.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3835382d67a8067a185b31a6fa15c860.exe
Resource
win10v2004-20231215-en
General
-
Target
3835382d67a8067a185b31a6fa15c860
-
Size
240KB
-
MD5
3835382d67a8067a185b31a6fa15c860
-
SHA1
793e6c0ef605e10c30d6081bba87df9b4c51d2c3
-
SHA256
71fad32e1b781c5dd79c3eeaf7e41d146934f5e1524a4b73ca90c07db8f64ce5
-
SHA512
e4b9cabbd18bb1b1c843d877650d1042d323cd69f44664e0f542c5be10e99bd0457059f1403424fda2707f96f7a7b2d1f9c655ffdb553df5e3fbcec3b1fd8984
-
SSDEEP
6144:NDaY65MWdoip1L2W66hZg3kGUL9XZNp9tEcZCJ:r6iFGhdg3oL9X5/rZCJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3835382d67a8067a185b31a6fa15c860
Files
-
3835382d67a8067a185b31a6fa15c860.exe windows:4 windows x86 arch:x86
1524ab84bbab75850c4130b1d814c25f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
GetLocaleInfoW
SetEndOfFile
GetPrivateProfileSectionNamesA
GetDateFormatA
InterlockedDecrement
HeapAlloc
WriteFile
SetLastError
IsBadWritePtr
TlsGetValue
LeaveCriticalSection
LocalUnlock
lstrlenW
SetEnvironmentVariableA
SetHandleCount
InterlockedExchangeAdd
GetFileType
GetLastError
SetVolumeLabelA
LCMapStringW
EnterCriticalSection
GetLocaleInfoA
EnumSystemLocalesA
GetEnvironmentVariableW
GetStringTypeA
TlsFree
GetEnvironmentStringsW
GetProcAddress
SetComputerNameA
GetEnvironmentStrings
VirtualProtect
GetVolumeInformationW
DeleteCriticalSection
CreateProcessW
GetStringTypeW
VirtualQuery
InitializeCriticalSection
VirtualFree
IsValidLocale
CreateEventW
GetTimeFormatA
TlsAlloc
GetCurrentThread
HeapReAlloc
HeapSize
ExitProcess
FreeResource
TlsSetValue
VirtualAlloc
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentProcess
GetVersionExA
GetModuleHandleA
GetACP
GetTimeZoneInformation
GetUserDefaultLCID
GetCurrentThreadId
LCMapStringA
UnhandledExceptionFilter
CompareStringW
GetCPInfo
GetCurrentProcessId
GetModuleFileNameA
HeapCreate
CompareStringA
LocalReAlloc
GetTickCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsW
MultiByteToWideChar
IsValidCodePage
RtlUnwind
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
InterlockedExchange
HeapDestroy
GetCalendarInfoA
GetDiskFreeSpaceExA
GetCommandLineA
WriteProfileStringW
GetOEMCP
GetSystemInfo
HeapFree
TerminateProcess
LoadLibraryA
comdlg32
FindTextW
GetOpenFileNameA
PageSetupDlgA
PrintDlgA
GetSaveFileNameA
PrintDlgW
wininet
SetUrlCacheHeaderData
InternetGetConnectedStateEx
InternetConnectA
InternetSetOptionW
ReadUrlCacheEntryStream
FindFirstUrlCacheGroup
InternetSetOptionExW
InternetGetConnectedStateExW
HttpSendRequestExA
HttpOpenRequestW
InternetOpenUrlA
InternetSetCookieW
FtpOpenFileW
FindFirstUrlCacheContainerW
InternetDialW
UnlockUrlCacheEntryFileW
InternetSetOptionExA
InternetReadFileExA
InternetWriteFileExA
InternetCombineUrlW
shell32
SHLoadInProc
SHEmptyRecycleBinA
FreeIconList
DragQueryPoint
SHEmptyRecycleBinW
RealShellExecuteExW
CheckEscapesW
SHQueryRecycleBinW
SHGetPathFromIDListA
DoEnvironmentSubstA
ExtractAssociatedIconA
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 135KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ