Static task
static1
Behavioral task
behavioral1
Sample
3ae80d6977e7cefe8f4d43470c5d6a57.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ae80d6977e7cefe8f4d43470c5d6a57.exe
Resource
win10v2004-20231222-en
General
-
Target
3ae80d6977e7cefe8f4d43470c5d6a57
-
Size
15KB
-
MD5
3ae80d6977e7cefe8f4d43470c5d6a57
-
SHA1
2c6b077b09aee7b279e423596fea732f5a1def12
-
SHA256
af8417653fabd90cb0888a6ea82cbadf29c4f8fd5b27a1d4d5af4129adbac021
-
SHA512
4b9b91b939a7bcd29b6066b59890ddf1aa11b297c3d4ece0314fc80ad4afc1dfc4bf325972f6686d8ba96dc11fb0ab3a6457f4791449e00d3aeed9a84736ce3b
-
SSDEEP
192:zZO4Uf+m8nNVI4TQOQa81ers82dafDZhNz5Hyn2SewMlXxmiCDpo9V6EodU1V:Mx0HI4hcGs826vyQvxmNDpo9NodU1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ae80d6977e7cefe8f4d43470c5d6a57
Files
-
3ae80d6977e7cefe8f4d43470c5d6a57.exe windows:4 windows x86 arch:x86
749ea44795816f3ea35f48cf1be55ae6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
OpenProcess
GetFileSize
CloseHandle
CreateFileA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WriteFile
lstrcmpiA
DeleteFileA
ResumeThread
CreateProcessA
Sleep
SetThreadPriority
GetCurrentThread
SetPriorityClass
VirtualAllocEx
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
FindNextFileA
FindClose
FindFirstFileA
GetDriveTypeA
WinExec
GetWindowsDirectoryA
CreateThread
LCMapStringA
WideCharToMultiByte
RtlUnwind
GetStringTypeW
GetStringTypeA
WriteProcessMemory
CreateRemoteThread
ExitProcess
GetSystemDirectoryA
GetModuleFileNameA
GetCurrentProcess
CopyFileA
MultiByteToWideChar
LCMapStringW
user32
GetWindowThreadProcessId
FindWindowA
MessageBoxA
wsprintfA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp0 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ