Static task
static1
Behavioral task
behavioral1
Sample
3a77259e62413c53e59ad2300d883364.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a77259e62413c53e59ad2300d883364.exe
Resource
win10v2004-20231215-en
General
-
Target
3a77259e62413c53e59ad2300d883364
-
Size
172KB
-
MD5
3a77259e62413c53e59ad2300d883364
-
SHA1
1d41328723c8c39267985081f183f51d2d0112bf
-
SHA256
dccfd67bf4ca3197bdcbf0f0bd7d05c1d0eb49b7d5349448390d63b6b549287d
-
SHA512
6f8d0bf5fb38d1627c7601ad9f7e0f1e3850a16817d99ca706aaca7947705bc2975821e12d6295ab6b64585cf3f5bb1d7c960ba14d682dc39f49847d9f61f1b4
-
SSDEEP
3072:CIQZ5Xu3gkgioUHSDpf4VN/PK2/H5WevYY2K/cb2jGvmMpJ:aum6qfuxf/HAex/UMcJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a77259e62413c53e59ad2300d883364
Files
-
3a77259e62413c53e59ad2300d883364.exe windows:4 windows x86 arch:x86
f33cdddd93c74e136776ceb828248472
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
InitializeCriticalSection
lstrcpyA
lstrcatA
ExitProcess
GetVersion
GetStartupInfoA
HeapReAlloc
HeapAlloc
FlushFileBuffers
SetStdHandle
SetFilePointer
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetShortPathNameA
GetProcAddress
lstrlenA
MultiByteToWideChar
lstrlenW
GetCommandLineA
GetCurrentThreadId
CreateEventA
GetLastError
CreateMutexA
CloseHandle
InterlockedIncrement
GetVersionExA
LoadLibraryA
FreeLibrary
InterlockedDecrement
lstrcpynA
GetModuleHandleA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapFree
HeapSize
LCMapStringW
LCMapStringA
GetCurrentProcess
TerminateProcess
GetOEMCP
RtlUnwind
LocalFree
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
Sleep
EnterCriticalSection
TlsSetValue
TlsAlloc
GetACP
GetCPInfo
TlsGetValue
SetLastError
RaiseException
user32
CreateWindowExA
RegisterClassA
CharNextA
RegisterWindowMessageA
PostQuitMessage
ReleaseDC
PostMessageA
GetWindowLongA
GetCursorPos
PostThreadMessageA
DefWindowProcA
DestroyMenu
SetWindowLongA
FindWindowA
GetMessageA
DestroyWindow
CreatePopupMenu
AppendMenuA
GetSystemMetrics
SetForegroundWindow
TrackPopupMenu
KillTimer
DestroyIcon
SetTimer
GetDC
DispatchMessageA
gdi32
DeleteObject
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBkColor
SetTextColor
DeleteDC
BitBlt
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CoSuspendClassObjects
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
oleaut32
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
hccutils
LoadSTRING
LoadBITMAP
LoadIMAGE
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE