Static task
static1
Behavioral task
behavioral1
Sample
3a911a32ede4e552ac7245934a2c5852.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a911a32ede4e552ac7245934a2c5852.exe
Resource
win10v2004-20231215-en
General
-
Target
3a911a32ede4e552ac7245934a2c5852
-
Size
20KB
-
MD5
3a911a32ede4e552ac7245934a2c5852
-
SHA1
b965eeb0662adeb4949105cac837e68af3893347
-
SHA256
2a7525cdadfadc06060d612cb3556d30ffcf0aa733a4aff31773df23aae90487
-
SHA512
e8033ee809782aaaba1d532051c43356d81aaf987cec9c2bb75fe148181e18c1bbe23ca2af1723abd62cf806e6ee4e26d0d0254da2f140ffb9d9e9d87b44d111
-
SSDEEP
96:IFQnd97Z3iqVvoOm1DTdn3FVllnBSEnkJ3fggaoMrvhrygTdf9:ImndvSqxo5NTVpbng78r/pl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a911a32ede4e552ac7245934a2c5852
Files
-
3a911a32ede4e552ac7245934a2c5852.exe windows:4 windows x86 arch:x86
5ce96ab0e6c09edc89ba9348cf037069
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetTickCount
HeapAlloc
HeapReAlloc
IsBadStringPtrW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
exit
free
fwrite
getenv
memcmp
memmove
strchr
strcmp
strcpy
strcspn
strlen
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 160B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 876B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE