Static task
static1
Behavioral task
behavioral1
Sample
3a17841abc52d65e3246bc9be4ec2da3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a17841abc52d65e3246bc9be4ec2da3.exe
Resource
win10v2004-20231222-en
General
-
Target
3a17841abc52d65e3246bc9be4ec2da3
-
Size
504KB
-
MD5
3a17841abc52d65e3246bc9be4ec2da3
-
SHA1
ca5704aa84aab41a6e07b3d14b4bbc271bb7dd28
-
SHA256
19f666f81ec545407f122a1fe7b0ac964155eeccea457b3ee91dcb34bbf5794b
-
SHA512
d2cfb943ca83129cc39a4350b499982b2421ed69924553eb2601d7d2d5d842354dcfa00c61ee96e9172d56e04194a723f22e31254ee0f9ea16f88d3101ac2629
-
SSDEEP
12288:T2S6cqfnrM7kwzj2kwBt8lxRFtHk5kM6qZcp3/PWNwNAa4T0oNt:Tk5k7HBNAa4TRN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a17841abc52d65e3246bc9be4ec2da3
Files
-
3a17841abc52d65e3246bc9be4ec2da3.exe windows:4 windows x86 arch:x86
518a00a06e537efa2b132b6a0b6981a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
DeviceIoControl
GetVersionExA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
FormatMessageA
GetShortPathNameA
GetLocaleInfoA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
CreateEventA
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
GetStdHandle
ExitProcess
HeapReAlloc
CreateProcessA
VirtualFree
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
SetEvent
GetSystemTime
ResumeThread
CopyFileA
TerminateThread
DeleteCriticalSection
GetFileTime
SetFileTime
SetEnvironmentVariableA
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
FlushFileBuffers
ReleaseMutex
CreateMutexA
TerminateProcess
OpenProcess
GetCurrentProcess
GetACP
GetComputerNameA
GetTimeZoneInformation
GetModuleHandleA
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
InterlockedIncrement
lstrlenA
WideCharToMultiByte
VirtualAlloc
InterlockedDecrement
SetFileAttributesA
FindNextFileA
FindClose
WaitForSingleObject
Sleep
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalFree
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
VirtualProtect
user32
PostThreadMessageA
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
GetCursorPos
wsprintfA
GetForegroundWindow
ExitWindowsEx
GetSystemMetrics
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
EndDialog
PostQuitMessage
SetCursor
MessageBoxA
LoadStringA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostMessageA
UnregisterClassA
GetPropA
SetPropA
DefWindowProcA
GetDC
ReleaseDC
gdi32
GetStockObject
GetDeviceCaps
advapi32
RegDeleteValueA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
RegCloseKey
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
SetServiceStatus
ReportEventA
RegisterEventSourceA
DeleteService
RegCreateKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
InitiateSystemShutdownA
RegConnectRegistryA
RegSetValueExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
StringFromCLSID
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
Sections
.text Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ