Static task
static1
Behavioral task
behavioral1
Sample
3be654ee6103334fe90561332e056c04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3be654ee6103334fe90561332e056c04.exe
Resource
win10v2004-20231222-en
General
-
Target
3be654ee6103334fe90561332e056c04
-
Size
12.4MB
-
MD5
3be654ee6103334fe90561332e056c04
-
SHA1
b03a599e86ab72348d9a39521bdb2db8a14b911e
-
SHA256
15dbfd71489626555e4e505e188cf56e26fd6e8a192037562d8d4cd397412c01
-
SHA512
46a27a9dc0cf7ab853139750855cf214466907058163212dd925c08a4d9cc14b8aa1f6b880bce9d9a945213aed4cad76f7da82207b98dcfdf70a5faea0108e4b
-
SSDEEP
393216:R4J9vI4bvaWwM0d2J5jb2hm8YHp3MWX42T:CJ9vzzM6J52YJ3T4M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3be654ee6103334fe90561332e056c04
Files
-
3be654ee6103334fe90561332e056c04.exe windows:5 windows x86 arch:x86
a7635d0e92de1ff8bd19095cc80528b0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessW
SizeofResource
LockResource
LoadResource
FindResourceW
GetModuleHandleW
CloseHandle
GetLastError
WaitForSingleObject
CreateMutexW
GetCurrentProcess
GetModuleFileNameW
CreateFileW
GetTempPathW
DeviceIoControl
GetWindowsDirectoryW
FindFirstFileW
WriteFile
GetFileAttributesW
ReadFile
FindClose
RemoveDirectoryW
FindNextFileW
DeleteFileW
SetFileAttributesW
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
SetFilePointer
SystemTimeToFileTime
SetFileTime
GetFileAttributesA
CreateDirectoryA
GetCurrentDirectoryA
LocalFileTimeToFileTime
FlushFileBuffers
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
RaiseException
RtlUnwind
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
user32
MessageBoxW
wsprintfA
rpcrt4
UuidToStringW
RpcStringFreeW
UuidCreate
shlwapi
PathIsDirectoryW
PathFileExistsW
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
SHGetPathFromIDListW
SHGetFolderLocation
SHCreateDirectoryExW
ole32
CoTaskMemFree
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18.9MB - Virtual size: 18.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ