Static task
static1
Behavioral task
behavioral1
Sample
3a801ad3f97842375c50314774904901.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a801ad3f97842375c50314774904901.exe
Resource
win10v2004-20231215-en
General
-
Target
3a801ad3f97842375c50314774904901
-
Size
365KB
-
MD5
3a801ad3f97842375c50314774904901
-
SHA1
888a2812374c6f8210ba64bf287c9c4e4b9f8df6
-
SHA256
1fa06a8153366d030edebe4235dd8ce209a90a7de88351a0ac01884ceeeb4b46
-
SHA512
0004f4fe7ed1dec95414d7e3ac1cdb095b700382365c9840bf6ffba86d12f8957e092e4d131885701990c6b6d3b03ace6ef8752f1ffb95229d90745dc5dfaaf2
-
SSDEEP
6144:GF7vx0NXgEJL8kTvI/qFUmZQab7T5kaRJMggJEEVlRbkSD+WyWIaNmp:GF7vC+EJVTU5OQdaRag4ESluSDj3q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a801ad3f97842375c50314774904901
Files
-
3a801ad3f97842375c50314774904901.exe windows:4 windows x86 arch:x86
aa63b8ab21d59ad44a49bf9a7950e3ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
EnumResourceTypesA
LoadLibraryExW
GetModuleHandleA
SetLastError
GetLastError
GetTickCount
GetComputerNameA
CloseHandle
VirtualProtect
Sleep
ReleaseMutex
FreeConsole
TlsGetValue
GetDiskFreeSpaceExW
GetExitCodeProcess
GetDriveTypeA
FindClose
DeleteCriticalSection
GetCommandLineA
shell32
DllGetVersion
DragQueryFileA
DragAcceptFiles
SHFree
ShellAboutA
SHGetNewLinkInfo
ShellMessageBoxA
SHGetDiskFreeSpaceA
DragFinish
StrChrA
SHGetSettings
SheChangeDirA
SHGetMalloc
glmf32
glsChannel
glsBinary
glsBlock
glsComment
glsAppRef
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ