Static task
static1
Behavioral task
behavioral1
Sample
3bba8b2f3bc8c29b56662fac9a0c7842.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3bba8b2f3bc8c29b56662fac9a0c7842.exe
Resource
win10v2004-20231215-en
General
-
Target
3bba8b2f3bc8c29b56662fac9a0c7842
-
Size
41KB
-
MD5
3bba8b2f3bc8c29b56662fac9a0c7842
-
SHA1
2c4ced04c2db675797a926bf741424f353fd0489
-
SHA256
5cba97aab9b1a6ed685f47e76e8146c17b490b5457a6d1ec62a0ce55e006bf38
-
SHA512
12cf5a023ac7769e0b39f47592020bc4f5d1b9ca599349abc6f2738af6881d2062a7712d173c1ee2e16db6323674ffc081510769f4bb4260937ef4501f7095e2
-
SSDEEP
384:oxzQY3/HJEoaUSA036y6CVlqHM1R9/ZAxjr6+e9Pfqbn16zWq7XWUVbZb7O:oxzQ2vJEon69vlqHM1/Kxaha5sXFI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bba8b2f3bc8c29b56662fac9a0c7842
Files
-
3bba8b2f3bc8c29b56662fac9a0c7842.exe windows:4 windows x86 arch:x86
694b77464bca15bbf307a460db6792e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
LoadLibraryExA
GlobalAlloc
GetCurrentProcess
DuplicateHandle
ReadFile
GetFileSize
SetFileAttributesA
lstrcatA
GetModuleFileNameA
GetWindowsDirectoryA
GetDriveTypeA
GetCurrentProcessId
MoveFileExA
DeleteFileA
CreateMutexA
GetFileAttributesA
SetLocalTime
GetLocalTime
Sleep
VirtualAllocEx
WriteProcessMemory
DeviceIoControl
WinExec
GetLastError
CreateFileA
WriteFile
GetSystemDirectoryA
CopyFileA
FreeLibrary
ExitProcess
LoadLibraryA
GetSystemDirectoryW
lstrcatW
GetModuleHandleA
GetProcAddress
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
CloseHandle
user32
MessageBoxA
GetWindowTextA
WindowFromPoint
FindWindowA
GetWindowThreadProcessId
PostMessageA
GetParent
GetCursorPos
advapi32
RegCloseKey
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
shell32
ShellExecuteA
msvcrt
strstr
free
__dllonexit
_onexit
sprintf
fprintf
??2@YAPAXI@Z
strncpy
fopen
fclose
Sections
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nah Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE